Sei sulla pagina 1di 52

.

SCIENCE & TECFThiQL¢GY


January, 1973

CD puters
and automation
and people

"PHROPASE"

~.

The Path to Championship Chess by Computer - Donald Michie


Computer-Assisted Instruction Activities in - Marshall J. Farr
Naval Research
Databanks in a Free Society - Alan F. Westin
The Social Responsibility of Computer Specialists - Harvey S. Gellman
President Richard M. Nixon, the Bay of Pigs, and - Richard E. Sprague
the Watergate Incident .

5106049 01 0 P 7401 201721


TECHN CAL SERV CES
r J5 5P ' ml 018
180 W SAN CA R.lOS ST
SA JOSE CA 95 113
Vo l. 22, No. 1
IF YOU COULD PREVENT JUST ONE IMPORTANT MISTAKE BEFORE IT HAPPENED -
- like the Democratic Party's mistake with Senator Eagleton
- like the Republican Party's mistake with the Watergate Bugging
like the West German government's mistake in not catching the Arab
guerrillas before they penetrated to the Israeli Olympic Team's building
like Southern Airways' mistake in allowing three hijackers with guns on to
one of their planes

HOW MUCH WOULD THAT BE WORTH TO YOU - $100? - $1000? more?


Our considered estimate is that 10 to 20% or more of the cost of operation of most businesses is the cost of
mistakes. (Just one foreseeable mistake that "Computers and Automation" made in 1970 has cost us $4000.)

I
WOULDN'T YOU AGREE THAT SENSE, COMMON AND UNCOMMON, \
OUGHT TO BE THE KEY TO PREVENTING MISTAKES? f
In a number of the issues of liThe Notebook on Common Sense, Elementary and Advanced", we examine
systematically the prevention of mistakes, such as:

No. 15: Preventing Mistakes from Failure to Understand ) - Volume 1, first


No. 23: Preventing Mistakes from Forgetting subscription year

No. 38: The Concepts of Feedback and Feedback Control ) - Volume 2, second
No. 41: Preventing Mistakes from Unforeseen Hazards su bscription year

Among the forthcoming issues of the Notebook in Volume 2 are:

- Preventing Mistakes from Camouflage


- Preventing Mistakes from Placidity

and we are planning at least 20 more issues in Volumes 2 to 4 under this general heading.

WHY NOT TRY THE NOTEBOOK ON COMMON SENSE?


GUARANTEE: (1) You may return (in 7 days) the PAST ISSUES: As a new subscriber, you do not miss past
first batch of issues we send you, for FULL issues. Every subscriber's subscription starts at Vol. 1,
REFUND, if not satisfactory. (2) Thereafter, you No.1, and he eventually receives all issues. The past
may cancel at any time, and you will receive issues are sent to him usually four at a time, every week
a refund for the unmailed portion of your sub- or two, until he has caught up, and thus he does not miss
scription. in')Portant and interesting issues that never go out of date.

HOW CAN YOU LOSE?


- - - - - - - - - - - - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - - - - - - - -
To: COMPUTERS AND AUTOMATION AND PEOPLE
815 Washington St., R12, Newtonville, Mass. 02160
( ) YES, please enter my subscription to the Notebook on Common Sense at $12 a year,
24 issues (newsletter style), and extras.
( ) Please send me (as FREE premiums for subscribing) the first six issues:
1. Right Answers - A Short Guide to Obtaining Them 4. Strategy in Chess
2. The Empty Column 5. The Barrels and the Elephant
3. The Golden Trumpets of Yap Yap 6. The Argument of the Beard
( ) I enclose $ ( ) Please bill me ( ) Please bill my organization
NAME _______________________________________________ TITLE _________________________________

ORGANIZATION ______________________~------------------------------------------------------
ADDRESS ___________________________________________________________________________________
SIGNATURE ___________________________________________ Purchase Order No. _______________________ I
2 COMPUTERS and AUTOMATION for January. 1973

I
INVENTORY OF THE 36 ISSUES OF - TITLES AND SUMMARIES

THE NOTEBOOK ON COMMON SENSE, FIRST YEAR

VOLUME 1 VOLUME 2
1. Right Answers - A Short Guide to Obtaining Them 31. Adding Years to Your Life Through Common Sense
A collection of 82 principles and maxims. Example: 32. The Number of Answers to a Problem
"The moment you have worked out an answer, start 33. "Stupidity has a Knack of Getting Its Way"
checking it - it probablY isn't right." 34 and 35. Time, Sense, and Wisdom
2. The Empty Column 36. Wisdom - An Operational Definition
A parable about a symbol for zero, and the failure
.... 24 issues promised, 36 issues delivered, for good measure
to recognize the value of a good idea.
3. The Golden Trumpets of Yap Yap
4. Strategy in Chess
5. The Barrels and the Elephant Some Comments from Subscribers
A discussion of truth vs. believability. believe these to be the best, if not the most important,
6. The Argument of the Beard readi ng that I have had th is year.
The accumulation of many small differences may - Harold J. Coate, EDP Manager, St. Joseph, Mo.
make a huge difference. Your concept is brilliant, and a welcome antidote to much
7. The Elephant and the Grassy Hillside
which is passed off as useful knowledge these days. Keep
The concepts of the ordinary everyday world vs.
the pointer readings of exact science. up the good work.
8. Ground Rules for Arguments - Charles E. Abbe, Data Systems Analyst, Pasadena,
9. False Premises, Valid Reasoning, and True Conclusions Calif.
The fallacy of asserting that the premises must first Very good articles; something all managers should read.
be correct in order that correct conclusions be - William Taylor, Vice President, Calgary, Alberta
derived. As I am involved with systems work, I can always use one
10. The Investigation of Common Sense of the issues to prove a point or teach a lesson.
11. Principles of General Science and Proverbs - Edward K. Nellis, Director of Systems Development,
8 principles and 42 proverbs. Pittsford, N.Y.
12. Common Sense - Questions for Consideration Thoroughly enjoy each issue.
13. Falling 1800 Feet Down a Mountain - David Lichard, Data Processing Manager, Chicago, III.
The story of a skimobiler who fell 1/3 of a mile All are good and thought-provoking - which in itself
down Mt. Washington, N.H., and was rescued the is worthwhile. Keep it up.
next day; and how he used his common sense and - Richard Marsh, Washington, D.C.
survived.
Especially like "Right Answers".
14. The Cult of the Expert
- Ralph E. Taylor, Manager of Research and Develop-
15. Preventing Mistakes from Failure to Understand
ment, West Chester, Ohio
Even though you do not understand the cause of
some trouble, you may still be able to deal with Your tendency to deal with practical applications is very
it. The famous example of a cure for malaria. rewarding.
- Jeffrey L. Rosen, Programmer, Toronto, Canada
16. The Stage of Maturity and Judgement
17. Doomsday in St. Pierre, Martiniq'ue - Common Sense
vs. Catastrophe PAST ISSUES: As a new subscriber, you do not miss past is-
How 30,000 people refusing to apply their common sues. Every subscriber's subscription starts at Vol. 1, no.
sense died from a volcanic eruption. 1, and he eventually receives all issues. The past issues
18. The History of the Doasyoulikes are sent to him usually four at a time, every week or
19. Individuality inHuman Beings two, until he has caught up, and thus he does not miss
Their chemical natures are as widely varied as important and interesting issues that never go out of date.
their external features.
20. How to be Silly GUARANTEE: (1) You may return (in 7 days) the first batch
71 recipes for being silly. Example: "Use twenty of issues we send you, for FULL REFUND, if not satis-
words to say something when two will do." factory. (2) Thereafter, you may cancel at any time, and
21. The Three Earthworms you will receive a refund for the unmailed portion of
A parable about curiosity; and the importance of your subscription. -
making observations for oneself. WE WANT ONLY HAPPY AND SATISFIED SUBSCRIBERS.
22. The Cochrans vs. Catastrophe
~ - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - -
The history of Samuel Cochran, Jr., who ate some
vichyssoise soup. To: Computers and Automation and People
23. Preventing Mistakes from Forgetting 815 Washington St., R1, Newtonville, Mass. 02160
24. What is Common Sense? -
An Operational Definition ) YES, I would like to try the "Notebook on Common
A proposed definition of common sense not using Sense, Elementary and Advanced". Please enter my
synonyms but using behavior that is observable. subscription at $12 a year, 24 issues, newsletter style,
25. The Subject of What is Generally True and Important - and extras. Please send me issues 1 to 6 as FREE
Common Sense, Elementary and Advanced PREMIUMS for subscribing.
26. Natural History, Patterns, and Common Sense I enclose ) Please bill me.
Some important techniques for observing.
27. Rationalizing and Common Sense ) Please bill my organization.
28. Opposition to New Ideas Name _ _ _ _ _ _ _ __ Title _ _ _ _ _ _ _ _ __
Some of the common but foolish reasons for
Organization _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
opposing new ideas.
29. A Classification and Review of the Issues of Vol. Address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
30. Index to Volume 1
Signature _ _ _ _ _ _ _ _ _ Purch. Order No. _ _ __

COMPUTERS and AUTOMATION for January, 1973 3


Vol. 22, No.1
January, 1973 computers
and 'automation
and people
Editor Edmund C. Berkeley

Assistant Barbara L. Chaffee


Editors Linda Ladd Lovett
Neil D. Macdonald

Software Stewart B. Nelson Computers and the Intellectual Frontier


Editor
7 The Path to Championship Chess by Computer [T A]
Advertising Edmund C. Berkeley by Professor Donald Michie, Director, Department of
Director Machine Intelligence, Edinburgh University, Scotland
How a computer can probably be programmed to exceed
Art Director Ray W. Hass
the talent of the best human chess players ...... and "if
Contributing John Bennett we can find out how to program world championship chess,
Editors Moses M. Berlin then we can program anything."
Andrew D. Booth
John W. Carr III Computers and Education
Ned Chapin 10 Computer-Assisted Instruction Activities in [T A]
Leslie Mezei
Naval Research
Ted Schoeters
Richard E. Sprague by Dr. Marshall J. Farr, Office of Naval Research,
Arlington, Va.
Advisory James J. Cryan A report on some of the areas of computer-assisted
Committee Bernard Qu int instruction in which the Office of Naval Research has
a strong interest in research and development.

Editorial Berkeley Enterprises, Inc. Computers and Society


Offices 815 Washington St.
Newtonville, Mass. 02160
18 Databanks in a Free Society: A Summary of the [NT A]
617 -332-5453 Project on Computer Databanks
by Professor Alan F. Westin, Columbia University, New
Advertising The Publisher York, N.Y., and many associates
Contact Berkeley Enterprises, Inc. A summary of a nationwide factual study (under the
815 Washington St. auspices of the National Academy of Sciences) of:
Newtonville, Mass. 02160 what the use of computers is actually doing to record-
617 -332-5453 keeping in the United States; and what the growth of
large-scale databanks, both manual and computerized,
"Computers and Automation" is pub-
lished monthly, 12 issues per year, at 815
implies for citizens' rights to privacy and the due
Washington St., Newtonville, Mass. 02160, process of law.
by Berkeley Enterprises, I nco Printed in
U.S.A. Second Class Postage paid at Boston, 14 The Social Responsibility of Computer Specialists [NT A]
Mass., and additional mailing points.
Subscription rates: United States, $9.50 by Dr. Harvey S. Gellman, Toronto, Canada
for one year, $18.00 for two years. Canada: How computer systems (and other technology) often
add 50 cents a year for postage; foreign, add
$3.50 a year for postage. produce unexpected, troublesome, and even harmful
NOTE: The above rates do not include side-effects - wh ich are made worse by the non-
our publication "The Computer Directory
and Buyers' Guide". If you elect to re-
professional attitudes of many computer specialists.
ceive "The Computer Directory and Buyers'
Guide", please add $9.00 per year to your
6 From "Computers and Automation" to [NT E]
subscription rate. "Computers and People;'
Please address all mail to: Berkeley
Enterprises, Inc., 815 Washington St., New-
by Edmund C. Berkeley, Editor, Computers and
tonville, Mass. 02160. Automation and People
Postmaster: Please send all forms 3579
to Berkeley Enterprises, Inc., 815 Washing-
How and why the time has come when a change in the
ton St .. Newtonville, Mass. 02160. name of Computers and Automation should be con-
© Copyright 1973, by Berkeley Enter- sidered, and be put into effect, gradually.
prises, Inc.
Change of address: If your address
changes, please send us both your new
address and your old address (as it ap-
pears on the magazine address imprint), and
allow three weeks for the change to be
made.

4 COMPU~ERSand ,AUTOMATION for January, 1973


The magazine of the design, applications, and implications of
information processing systems - and the pursuit of truth in
input, output, and processing, for the benefit of people.

Computer People and Aptitude Tests


31 Eight Photographs of a Bush: Answers- [NT F]
Pictorial Reasoning Tests - Part 8 Front Cover Picture
by Neil Macdonald, Assistant Editor The front cover drawing, called
How close observation and common-sense reasoning "Phropase", was produced by an
can lead to the answers to the pictorial reasoning Algol 60 program, drawing straight
test published in the October 1972 issue. lines ax + by + c = 0, where a, band
The Profession of Information Engineer and the Pursuit of Truth c were "stepped arithmetically in
nested loops". The computer used
33 President Richard M. Nixon, the Bay of Pigs, and [NT A]
was an ICL 1904A, driving a Cal-
the Watergate Incident
camp 1934/6 plotter. The program-
by Richard E. Sprague, Hartsdale, N.Y.
mer-artist is Nihan Lloyd-Thurston,
How President Nixon lied in 1960 about the plans for
Kings Mill Lane, South Nutfield,
the Bay of Pigs Invasion, and is suppressing in 1972
Surrey, England.
the investigations of the Watergate Incident.
37 The Frenchman Who Was To Kill Kennedy [NT A]
by Phillippe Bernert and Camille Gilles, L 'Aurore, Paris,
France; translated by Ann K. Bradley, NOTICE
Computers and Automation and People *0 ON YOUR ADDRESS IMPRINT
Engl ish translation of the f=rench newspaper report on MEANS THAT YOUR SUBSCRIP-
TION INCLUDES THE COMPUTE R
Jose Luis Romero, which was reprinted in French in the DIRECTORY. *N MEANS THAT
December issue of Computers and Automation YOUR PRESENT SUBSCRIPTION
DOES NOT INCLUDE THE COM-
40 Why I Distrust the Romero Story [NT A] PUTER DIRECTORY.
by Robert P. Smith, Director of Research, Committee
to Investigate Assassinations, Washington, D.C.
The Romero report reprinted from L 'Aurore has many Departments
earmar.ks indicating that it is very difficult to believe.
41 Across the Editor's Desk -
13 Unsettling, Disturbing, Critical [NT F]
Computing and Data
Statement of pol icy by Computers and Automation and People
Processing Newsletter
Reference Information 50 Advertising Index
23 Annual Index for Volume 21 (1972) of [T R] 46 Calendar of Coming Events
Computers and Automation 47 Monthly Computer Census
An index by author, title, and subjects, to the 44 New Contracts
45 New Installations
thirteen 1972 issues of Computers and Automation

Computers and Puzzles


32 Numbles [T C]
by Neil Macdonald Key
36 Problem Corner [T C]
[A] - Article
by Walter Penney, CDP
[C] - Monthly Column
[E] - Editorial
[F] - Forum
[G] - The Golden Trumpet
[NT] - Not Technical
[T) - Technical

COMPUTERS and AUTOMATION for January, 1973 5


EDITORIAL

From nComputers and Automation"


. to nComputers and People"

1. Names - medicine and computers


When this magazine was first published in 1951, it was - traffic control and computers
called "The Computing Machinery Field". That was a - antiballistic missile systems and computers
time when many people were still searching for a short - urban problems and computers
name for "computers". The word "computer" at that - the side effects of computers upon society
time always implied a human being computing, and not a - the prevention of doomsday and the application
machine. The same view influenced the choice of name of computers thereto
of the "Association for Computing Machinery." 3. Policy
In 1953 this magazine changed its name to "Computers
and Automation," and has retained that name for twenty As we have said before, we believe that the profession
years. These years have seen great changes in "the com- of information engineer includes not only competence in
puting machinery field", which has become "the computer handling information using computers and other means but
field". A great deal of automation also has occurred, but also a wide responsibility towards people, a professional and
computers and not automation have occupied the lime- engineering responsibility. This includes making sure of:
light of public attention.
- the reliability and social validity of the input data;
The three-syllable term "computers", it seems to me,
- the correctness of the processing; and
is still preferable to any of:
- the reliability and social validity of the output
- data processing, five syllables, plebeian, more and results.
more out of date because much more is pro-
in the same way, a bridge engineer takes a professional
cessed than just data;
responsibility for the reliability and significance of the
- information processing, seven syllables, more ac-
data he accepts and uses, and the safety and efficiency of
curate, but also incomplete because it leaves
the bridges he constructs on which human beings will cross
out "idea processing", "artificial intelligence",
chasms risking their lives.
and other really important extensions of com- Accordingly, as our readers know, we often publish
puter programming; articles and other information related to socially useful in-
- "electronic data processing", nine sy IIables (clumsy), put and output of information systems. We seek to pub-
having all the disadvantages of "data processing" lish what is unsettling, disturbing, critical - but productive
plus the disadvantage of "electronic" which im- of thought and a better and safer earth for all humanity to
plies omission of "optical", "magnetic", etc.; live in - the fragile spaceship in which our children and
- "automatic data processing''; nine syllables (also future generations may have a future instead of facing
clumsy), having all the disadvantages of "data extinction.
processing" plus the disadvantage of "auto- The professional information engineer needs to relate
matic" which leaves out the essential contri- his engineering to the most important and most serious
butions of human guidance, human adapting problems in the world today: war; nuclear weapons; pol-
to applications, etc. lution; the population explosion; the frightening economics
It is interesting that the persons who tried so hard to nam{. of growth; widespread deception; and much more. In fact,
the field using an attitude of "keep your feet on the an especially serious and troublesome problem is systematic
ground" are the persons left behind - largely by the de- misrepresentation, deception, and lying by vested interests
velopment of computer programs that express an ever - a problem we focus on.
greater degree of reasoning, calculating, and sophistication.
4. Name Change
2. Substance
In recognition of these facts and this policy, we have
A great many of the important technical computer decided that the time has come when "Computers and
problems of the last 20 years have been largely solved; a Automation" will change its name to "Computers and
great many of the important social computer problems are People", in a gradual process using an intermediate name
very much unsolved. "Computers and Automation and People" - for short,
For several years it has been evident that the most im- "CAP" instead of "C&A". To change the name is rea-
portant field of unsolved problems related to computers is sonable and seems necessary and desirable; to change
the field of the relations of computers to people. To name gradually seems much better than to change abruptly.
just a few of these problems:
- privacy and computers E:~C.~
- monopoly and computers
- crime and computers Edmund C. Berkeley
- electronic warfare and computers Editor

COMPUTERS and AUTOMATION for January, 1973


The Path to Championship Chess By Computer

Professor Donald Michie, Director


Dept. of Machine Intelligence
Edinburgh University
Edinburgh, Scotland

"If we could program world championship chess, then we could program anything."

Based on a,l article "Programmer's Gambit" in The New Scientist for August 17, 1972, an inter-
national weekly review of science and technology, 128 Long Acre, London we 2, England, and
reprinted with permission.

Has something gone wrong with computer chess? If It is possible to take up two exaggerated and op-
so, what? In a recent New Scientist article (20 July posite positions concerning contemporary chess pro-
1972, vol. 55, p. 134) Peter Wason discussed the psy- grammes. Both are mistaken.
chology of the game. He also referred to computer
chess programs and, with an element of courteous un- Position 1: The attempt to match human intellectual
derstatement, observed "they are certainly below mas- skill across the chessboard has failed.
ter strength."
The Current Strength of Computer Chess
The first point to remark is that the task is far, Hubert Dreyfus, the Rand Corporation mathemati-
far more difficult than some early optimists supposed cian, pronounced a few years ago that no computer
-- so much so that quite radical advances in machine could play even amateur chess. He was challenged to
intelligence, not just in programming and hardware play against the Greenblatt chess program and was ig-
technology, are required if chess programs are ever nominiously defeated. This program is one of those
to break through to master play. which regularly take part in American tournaments, in-
cluding tournaments restricted to computer programs.
Two other programs of similar playing strength are
The "Grandmaster Barrier" those of Atkins and Slate and of Gillogly, currently
rated around 1400 to 1500 on the US Chess Federation
The reasons for what may be called the "grandmas- scale which is calculated on the basis of past tour-
ter barrier" are connected with powers of abstraction, nament performance. Table 1 may be of help in cali-
generalisation and learning, all of which are still brating this scale. Bobby Fischer's last USCF rat-
absent from tOday's chess programs. Chess at master ing was 2824, the highest ever awarded.
level makes such searching demands on these abilities
that it offers a life-time's dedication for outstand- Position 2: Computer programs will attain grandmas-
ing intellects. Hence, although it has been one of ter rating in the near future.
the earliest task domains to be chosen for machine
intelligence studies, chess remains one of the most Those who hold this position usually believe that
illustrative and one of the most elusive. The dis- it is simply a matter of developing and extending
tinguished applied mathematician, I. J. Good, himself present-day principles of chess programming, aided
an expert chess player, believes that when a chess by the continued rapid growth of hardware speeds and
program has been developed capable of defeating the storage capacities of computers. This second posi-
world champion, we shall be no more than five years tion is wrong for more subtle reasons than the first,
away from the appearance of the "ultra-intelligent and cannot be dismissed so cursorily.
machine", intellectually superior to man in all de-
partments of thought. While supporting Good's evalu- Chess Knowledge
ation, I would prefer to phrase it in other terms and
to say that if we could program world championship Consider the following two apparently unrelated
chess then we could program anythingl facts:

COMPUTERS and AUTOMATION for January, 1973 7


1. Not one of the three leading chess programs occu- Machine Intelligence
pies more than 20,000 locations of computer memory
(by this I mean "fixed" memory, not the working space Chess i like any other highly developed intel-
occupied for transient periods by the intermediate lectual sk 11 in that it can be subdivided into two
products of calculation). Stanford Research Insti- categories
tute's program for planning a robot's movements oc-
cupies more than five times this number. 1. What the player knows, and
2. What he can do with this knowledge.
2. Although for the past century or more chess games
at grandmastet level have usually ended in draws, These two subdivisions mirror very clearly two
Bobby Fischer recently won 19 consecutive games areas of machine intelligence research in which pro-
against grandmasters. gress has and has not been made. Virtually all the
progress before 1970 was concerned with category (2),
The interpretation which some chess experts place i.e. with the mechanisation of processes of search
on the second fact is that Fischer has discovered new and deduction whereby the direct implications of ca-
areas of knowledge about chess, and in some sense has tegory (1) may be efficiently extracted. Category
a deeper understanding of the game than his opponents. (1) itself, in the machine intelligence context, is
I have put emphasis upon "knowledge" and "understand- concerned with finding principles whereby large
ing" because these words give a clue to the extraor- bodies of knowledge may be represented in the machine
dinarily small machine memory space occupied by all in forms sui table: for indirect and analogical reason-
the above-mentioned chess programs. When we look in- ing; for the formation of new generalisations; and
side these programs we find virtually nothing there for the automatic modification and extension of the
which corresponds to "knowledge" or "understanding". "knowledge base" via learning processes.
What we do find can best be described as a finely
tuned mechanism for making the best possible job of In the 1950s and 1960s little progress was made
playing chess without knowing anything about the game with category (1). Hence experimental programs, for
or understanding what one is doing. chess as for everything else, necessarily took the
form of "toy systems" in which all the program's in-
genuity went to extracting the most out of a minimal
Table 1 repertoire of stored facts. We have seen that in the
case of chess such facts might be (a) the rules of
THE PERFORMANCE OF THE BEST chess, (b) evaluation rules which can say of any two
CONTEMPORARY CHESS PROGRAM board positions "this one is probably stronger than
that", and (c) stored "book" openings.
Bobby Fi scher 28

International grandmasters 26 to 28

International masters 23 to 26

American masters 21 to 23

Expert players 19 to 21
Strong amateurs 16 to 18

Best chess program 15

Most amateurs up to 14
Figure 1 Two chess
The figures are the U.S. Chess Federation rating positions conforming
to a single relational
scale with 00 omitted. This scale is calculated on description (see text).
the basis of past tournament performance. White has the move

Look-Ahead

This mechanism is essentially that of looking


ahead along a tree of possibilities, evaluating the
terminal nodes of the look-ahead tree according to
some "evaluation function", and then "backing up"
these values to the root of the tree by a process
known as "minimaxing". The various branches at the
root correspond to the immediately available moves;
the backed-up values associated with these branches
are used as the basis for selecting the next move.
The only chess "knowledge" is that contained in the
legal move generator (i.e. knowledge of the rules of
chess), in the evaluation function itself, and in
stored "book" openings (where these are employed).
Such knowledge is a grain of sand beside the moun-
tains amassed even by amateur players, and it is a
tribute to what can be accomplished by the look-ahead
process, and by sheer brute-force calculation, that
these chess programs can hold their own at all. Of Chess Theorems
course, if their authors knew how to program some of
the missing knowledge into the machine they would do Why should we not add to this bare cupboard the
so. good things which make a chess master what he is,

8 COMPUTERS and AUTOMATION for January, 1973


,)
starting with the vast mass of trite chess theorems, and sequences of schemas ("themes", "main varia-
such as: tions"), resorting to detailed look-ahead, for which
the human brain is ill-equipped, only when he has to.
"Bishops cannot attack squares of opposite
colour." Relational Descriptions

"A piece blocking an enemy isolated pawn is A compact notation for descriptions of the kind
safe from pawn attack." shown is given by the use of "relational structures"
illustrated graphically in Figure 2. Note that such
"King and Rook against King is a won game." a description typically covers many positions, and a
second position is shown, Figure 1 (b), which also
and going on to deeper theorems and postulates which conforms to the scheme of Figure 2. In the case
separate the expert's knowledge from the club play- chosen for illustration they do indeed have much in
er's, the master's from the expert's, and the grand- commonj in both cases white can mate taking advantage
master's from the master's? After all, a great deal of two pins. Moreover, this notation extends in a
even of this last and highest body of knowledge is natural and easy way to all the usual basic concepts
explicitly recorded in the published chess litera- -- "forks", "blocks", "discovered checks" and so
ture. Why not just put it all into the machine? forth.

The short answer is that the problem of how to


represent knowledge (whether of chess or of any OR OB~OR

other complex and ill-structured domain) in machine-


oriented form is the focal question for machine in-
telligence research in the 1970s; although intensive 08 -
\~ \ u'~::~K
K -KKtP .KR' \
studies are now under way, and preliminary gains have
been reported, we must expect to wait awhile before
the front decisively cracks.
Figure 2 A relational
description of the
chess positions of
\ KR
Key: _
'KKtP
Defends
Figure 1 drawn as a
labelled directed ===> Attacks
_ _ Pins
Computer Language for Salient Features graph (White in italics;
black in bold type) -- - ~ Can check

The heart of the problem is concerned with des-


cription -- with the development of computer lan- Not only do descriptive schemes of this kind cor-
guages and notations with powerful facilities for respond intuitively to the way in which chess posi-
describing the salient and significant features of tions are grouped for purposes of recall or for the
any situation. Let us try an impressionistic sketch, specification of sub-goals. They are ·beginning to
using both chess and non-chess examples, of some of playa prominent part in mechanisation techniques in
the issues involved. areas of machine intelligence superficially unrelated
to chess.
Figure 1 (a) shows a chess position, and we wish
to describe it. The exhaustive specification of
where every piece is has no use beyond the calcula-
tion of the tree of possibilities for look-ahead pur- o Scene
poses. If we want to think in a broader style about
the position we need a broader style of description.
The use of a few relations between pieces with a more
or less conventional notation might give us something /l "'"
O~O~O
like Table 2. (Pieces belonging to the side with
the move -- white -- are shown in italics, black
in bold)

Table 2
,,\/
Key:
Qarick

Figure:5 Graphic --+- Part of


notation analogous ==> Supported by
PINS, ATTACKS, DEFENSES, POSSIBLE CHECKS to that in Figure 2, ~ Kind of
applied to a visual
object
KR pins OB
QB pins KKtP
QB defends QR
Figure 3 depicts relational descriptions, using
essentially the same graphic notation, not of chess
QR can check K
OR attacks QB
positions but of visual scenes. These structures are
KR attacks KKtP
manipulated by a computer program written by Pat Win-
K defends KKtP ston and others at MIT. Its task is to construct de-
K defends OS scriptions of s~enes inspected through the television
K defends KKtP camera. The figure shows a number of objects all
OR defends KR conforming to the description for ARCH. The program
KR defends OR can be "taught" to improve its descriptions by being
OR can check K shown examples and counter-examples.
KR can check K
The entire program occupies many times more com-
We might or might not wish to add, for some purpose puter memory (again, we are speaking of program
or other, information concerning certain key pieces, space, not workspace) than the chess programs. Win-
such as "WK on KRl". ston's task is an intrinsically easier one than
theirs, but his program approaches it in a much
The important thing is that a schematic descrip- deeper fashion. What are the prospects of introduc-
tion of this kind defines a large class of positions ing a similar degree of depth into the approach to
computer chess, and what are the likely consequences
the members of which are hopefully (if the descrip-
tors have been well chosen) "essentially" similar to of doing so?
each other. The chess master reasons about schemas (please turn to page 36)

COMPUTERS and AUTOMATION for January, 1973 9


'\
I
Computer-Assisted I nstruction Activities
in Naval Research

Dr. Marshall J. Farr


Office of Naval Research
800 No. Quincy St.
Arlington, Va. 22217

'The computer is infinitely patient, and its programs can represent the
teaching approaches and knowledge of the best minds in pedagogy."

Computer-Assisted Instruction (CAl) refers to the man-computer relationship in which either party can
use of the computer for instruction, i.e., as a take the initiative, i.e., ask and answer questions
means of presenting material to, and interacting and engage in discussion. The Bolt, Beranek and
with, astudent. Navy activity in this domain is di- Newman approach with SCHOLAR generates the computer
rected toward utilization of the computer to provide dialogue out of a data base that is a complex but
adaptive, individualized instruction of the highest well-defined structure in the form of a semantic
quality. Because computer technology and its pro- network of facts, concepts and procedures. A se-
gramming arts are already so advanced, and are con- mantic information structure or network is an organ-
tinuing to progress so rapidly, on-line interactive, ization of units of information in terms of their
man-computer communication need not be stilted and meaning and mutual relationships. In contrast, when
impersonal. a network is based on how words are organized se-
quentially or grammatically within a sentence, it is
Advantages and Limitations
serving as a syntactic structure.
Research in CAl indicates that some students re-
late better to an interactive computer than to a hu- SCHOLAR is different from the traditional ap-
man instructor. And, of course, a computer is not proach to CAl, which may be considered to be frame-
subject to human frailties. Modern time-sharing oriented. In such a system, a frame (each single
computers are highly reliable, work overtime without display presented to the trainee) is constructed out
complaint, and never go on strike. Moreover, the of specific pieces of text, specific questions with
computer is infinitely patient, and its programs can their predicted answers, errors and anticipated
represent the teaching approaches and knowledge of branching. All frames in this kind of system are
the best minds in pedagogy as well as in diverse entered in advance by the teacher or programmer.
subject areas. In such a system, the student is capable of little
or no initiative, and must communicate with the
Despite the many advantages of CAl it should be computer in a relatively restricted form of lan-
recognized that the computer's tutorial effective- guage. And the teacher has the burden of preparing
ness is limited by what we still do not know about questions, answers, and branching strategies. Here,
basic learning processes, about why we learn, how the system controls the student; but it is incapable
we learn, how we remember, and how we integrate bits of real initiative or decision power of its own.
of knowledge into a coherent whole.
Information-Structure Oriented
These kinds of questions have been the subjects
of investigations sponsored by the Office of Naval In contrast to a frame-oriented system, SCHOLAR's
Research and directed toward the advancement of CAl semantic network system represents what Carbonell
technology. These studies shed light on such as- calls an Information-Structure-Oriented (ISO) ap-
pects as individual differences in learning and proach. The network allows SCHOLAR to generate the
means for identifying and taking advantage of an material to be presented to the student in reason-
individual's unique aptitudes and abilities, while ably natural conversational English. In its present
implementation, the experimental program, which uses
~~~ n.Lt~~~a~ n.L:I'lh~ s ~esire,t~ _1 ~~~~: _, ~_? ~ ~t~~~, ~~;~~,
\JM~ .........n.. . . . . . . . ~~ 0';" 1l1U\.dl l"VJl\.d:;J.I1CU v¥J.I.;U t;l\.pJ.V.LJ.JJ~

the learning process as with controlling it.


Dr. Marshall J. Farr is Director of the Personnel
Mixed-Initiative Dialogue and Training Research Program in the Psychological
Sciences Division of ONR. He also has served as
Under ONR sponsorship, Dr. Jaime Carbonell of Assistant Director of ONR's Engineering Psychology
Bolt, Beranek and Newman is pursuing research with Program. From 1960-1964, he was a Research Psy-
a system called "SCHOLAR," which is characterized chologist at the U.S. Naval Training Device Center,
by a mixed-initiative dialogue between learner and then located at Port Washington, New York. Dr.
computer. The term mixed-initiative indicates a Farr has taught in the Psychology Departments of
Fairleigh Dickinson University and the New School
Reprinted with permission from Naval Research Reviews, vol. 25, no. 9,
(formerly the New School for Social Research) in
September, 1972, published by the Department of the Navy, Office of New York City.
Naval Research, Arlington, Va. 22217

10 COMPUTERS and AUTOMATION for January, 1973


South American geography as its subject, is aimed at test his knowledge of the symptoms it would produce
reviewing the student's knowledge in this field. by attempting to predict the indicators and the
But it is being designed with a good degree of mod- types of information displayed by each, as they
ularity in both program and data base, in order to would be affected by this known malfunction. The
assure ready generalization to many other examples program wi 11, in thi s "backwards troubleshooting"
and fields of application. A good description, with mode, evaluate the student's predictions and correct
illustrations of the way SCHOLAR works, is contained those that are wrong.
in Carbonell's article in the October 1971 issue of
Naval Research Reviews. Carbonell will shortly be- Since equipment like the AN/SPA-66 radar repeater
gin to evaluate the instructional merit of the full and the AN/URC-32 radio transceiver have from 20 to
mixed-initiative capability as compared to a re- 40 front panel controls that have to be set in the
duced, less interactive, version of SCHOLAR. Both right patterns before symptom information is visible
versions will operate on the data base. on an indicator, the student must, of course, learn
these patterns. The troubleshooting section of
Performance Training TASKTEACH not only corrects the student's incorrect
patterns, but also includes a provision for drill
Dr. Joseph Rigney, who directs the Behavioral in making these settings. The student can select
Technology Laboratories at the University of South- the particular information he wants made known by
ern California, has been working on a method for some indicator. He then instructs the computer to
computer-assisted performance training, using a set the controls in the correct pattern, and is
computer time-sharing system to help trainees to given error-correcting knowledge of results by the
learn serial tasks, from operating equipment to program. The student can run through a series of
electronic troubleshooting. these drills any time he chooses, in conjunction
with a troubleshooting session.
TASKTEACH is the generic name of two large com-
puter programs for this tutorial system. TASKTEACH
provides the student with variable amounts of learn- Goal-Action Hierarchies
ing support, as he requests it, to help him organize
the material and the processes which lead to mas- In addition to the troubleshooting program, TASK-
tery. During each learning session, TASKTEACH con- TEACH includes a program to help students learn
tinuously updates the history of the student's other types of task structures. Radio operators,
progress and the state of the equipment or task for example, could learn how to tune the transmitter
structure that it is simulating. Thus it can gen- in the AN/URC-32, or how to set it up in a particu-
erate responses to the student from this updated in- lar one-of-five "receive modes." Similarly, a me-
formation. TASKTEACH logic is made specific to a chanic could learn how to disassemble, repair, and
particular equipment or task structure by relatively reassemble a mechanical device such as a carburetor.
short lists which describe elements and relation- As indicated earlier, this program is made specific
ships among them in sufficient detail for the simu- to a particular task by list-structures which de-
lation. These lists replace the conventional, scribe goals, subgoals, actions, and constraints
frame-by-frame description of the typical CAl in- that specify the ways these elements are organized
structional sequence. sequentially. Since almost all human work can be
described in terms of goal-action hierarchies, this
Trou bleshooting part of TASKTEACH is potentially widely applicable.

To use TASKTEACH to learn to troubleshoot elec- The TASKTEACH programs were designed to be used
tronic devices from front-panel controls and indi- with a variety of terminals, including on-line
cators, the student selects a course, e.g., on the front-panel simulators analogous to those currently
AN/SPA-66 radar repeater, and enters a problem num- being used by IBM for their in-house computer main-
ber. This directs the program to simulate a failure tenance training. However, these programs currently
in a particular circuit of the equipment. The com- are used with teletypes or alphanumeric CRTs and
puter then describes to the student, during its in- random-access slide projectors under program con-
teraction with him, those front-panel indicator trol. The projectors are used to display color
symptoms that the malfunction would produce. The photographs of controls and indicators on the par-
student proceeds to collect symptoms from indicators ticular equipment that is the subject of the train-
by manipulating the front-panel controls in patterns ing.
that will (1) make particular kinds of information
visible on each indicator when the equipment is In summary of TASKTEACH, it represents a capabil-
functioning normally, and (2) uncover all possible ity which provides a number of learner options, and
symptoms of abnormal functioning. The student can which can be used in a number of different ways or
do this symptom-collecting in any order he chooses. modes. The student need not have control over the
He is not constrained to a fixed procedural se- learning-support functions. They can be made auto-
quence. Furthermore, he can either ask for only one matic, left to the instructor to control, or, with
type of information at a time, or he can make a a little additional programming, they can be made
whole series of front-panel tesLS by entering a list part of an adaptive scheme. In a similar way dif-
of indicators and control settings in one input mes- ferent kinds of troubleshooting strategies could be
sage. By using some of the commands in TASKTEACH included as models for the student to learn.
that give him detailed knowledge of results, and
that allow him to "look -ahead" and test hypotheses CAl Course in Computer Programming
about the malfunction, the student 'can learn about
the effectiveness of each test he makes, and can in- Professor Richard Atkinson. Chairman of the Psy-
crease his knowledge of possible causes of symptoms. chology Department at Stanford University, has been
In this way, he can learn to improve his trouble- in charge of administering a CAl course in computer
shooting strategy. programming at Di Anza College (a junior college
near Stanford) and at UCLA. Students receive col-
"Backwards Troubleshooting" lege credit for this course, which was originally
developed with support from NASA Ames. For this
The student can also ask the program to "insert" ONR contract, Atkinson and his staff have been de-
a known malfunction in the equipment. He can then signing data-collection routines to measure student

COMPUTERS and AUTOMATION tor January. 1973 11


performance at frequent intervals during the course. range of research efforts. Hedl, in his doctoral re-
In addition, the program has been constructed so as search under the contract, has demonstrated the
to analyze a student-written program to see if it feasibility and validity of an interactive approach
will run on the computer. If not, the instructional to the individualized assessment of intelligence.
program assists the student in debugging his own Test items from the Slosson Intelligence Test, de-
material. veloped in 1963, were individually presented on a
CRT. Students typed in their answers for immediate
The computer program for this course allows the computer evaluation. The answer-analysis algorithm
learner to control what material is displayed to was based upon a key word/phrase dictionary for each
him, as well as his rate of learning. As the stu- item, which was developed from previous test-item
dent goes through the course, his response history protocols. The computer in this case, for the first
is recorded automatically in terms of how frequently time, was used for automatically administering an
he requests reviews, how long he devotes to various intelligence test, and for reaf-time response-evalu-
items and modules, how rapidly he responds, and so ation. If a student's answer was either correct or
on. The Stanford group will analyze the dominant incorrect, the program moved to the next item. If
patterns of learner behavior, and correlate each the answer was interpreted as partially correct, the
individual's response-history with his course computer instructed the student to explain more ful-
achievement. The findings will be examined to de- ly his response. If time limits for a given item
termine such things as the best time to branch, to were exceeded, the computer asked the learner to
repeat material, and to provide feedback to the "please answer the question or type pass," and then
student. gave him another chance at the question. If time
In the next phase of this research, two addition- ran out again, the item was scored as wrong, and the
al CAl modes will be tried. Their structure will be program went on to the next item. The computer-
based on the recommendations for optimal patterns of based version of the Slosson Intelligence Test was
presentation, review, feedback, etc., toward which experimentally compared with the oral administration
the research on the ongoing learner-controlled CAl of the traditional Slosson Test, as well as with
wi 11 lead. the Wechsler Adult Intelligenc~ Scale (WAIS). The
computer-based Slosson Intelligence Test correlated
Best Instruction Strategies? .75 with its traditional version. Equivalent con-
current validity relationships with the WAIS, for a
Why is the mode of learner-controlled instruction college population were: a .54 correlation between
a model from which optimal instructional strategies the WASI and CB-SIT; and a .52 correlation between
can be derived? When the student performs at his the WASI and the traditional SIT.
own rate, he is not constrained by a program. In a
sense, he automatically selects what is most moti- Anxieties
vating to him, what he feels he needs and wants to
learn. Learning might really turn out to be funo In other studies under this'FSU contract, meas-
Good students can tackle complex problems and can ures of both "trait anxiety" and "state anxiety"
concentrate on conceptual rather than computational were taken of students engaged in learning mathe-
matters. But most of all, who knows better than the matical material in a CAl mode. According to Dr.
pupil himself what he is ready to learn next, and Charles Speilberger of FSU, who first conceptually
when he is ready? After all, learning takes place, differentiated these two anxiety conditions, "trait"
in the final analysis, between the ears. anxiety represents the anxiety potential or prone-
.
Now, returning to Atkinson's work: The first ad-
ness of an individual, or in other words, how likely
he is to develop anxiety in situations commonly
ditional mode, a response-insensitive one, will be thought to provoke it. On the other hand, "state"
a straight-line, completely canned course. This anxiety is a temporary, transitory condition of
means that what is presented to the learner will be actual apprehension and heightened autonomic nerv-
inflexible, and completely independent of his re- ous system activity. The common psychological test
sponses. for measuring anxiety, the Taylor Manifest Anxiety
Scale, seems to measure trait anxiety, even though
The second additional mode involves a response- Taylor, its author, propounded.a theory based on
sensitive program, which contains the necessary state anxiety. Taylor never conceptualized two
logic to branch (e.g., for enrichment or remedial different dimensions of anxiety.
purposes) based on the student's ongoing course
achievement and his pre-course knowledge base. The CAl math learning investigations showed that
Here, although the computer program tailor-makes high state-anxiety students make more errors on the
the instruction provided to each student, based on difficult learning material than do low state-anxi-
continually-updated course-achievement information, ety learners. On the easier material, both state-
the learner has no option to tell the program how anxiety levels did equally well. The trait-anxiety
he would like it to interact with him, or what he level was not found to be related to performance.
would like it to offer.
Further FSU work on the effects of trait and
After these three different modes of CAl have state anxiety on CAl performance is more compli-
been implemented, they will be compared with each cated, combining the types of anxiety with types
other in terms of learning speed and quality. Each of material (non-technical vs. technical) and vari-
student's performance will also be examined in re- ous types of responses the subjects are called upon
lation to certain personality characteristics: for to make. Results here have been difficult to in-
example, to see whether certain types of individuals terpret because of interaction effects. More re-
habitually do better in a highly structured, non- search is planned in this area.
permissive learning environment.
Curiosity?
Assessment of Intelligence
The FSU researchers conceptualized curiosity as
A Florida State University (FSU) investigation in also being either trait curiosity or state curiosi-
CAl was established as part of the THEMIS program. ty. A "State Curiosity Scale" (SCS) was developed
Because of this heritage, it deals with a broad to measure this type. Since curiosity is a moti-

12 COMPUTERS and AUTOMATION for January. 1973


vational construct, it can aid in stimulating the book), it is desirable to develop improved methods
acquisition of knowledge or skills (which is, after for assessing learning progress and adjusting the
all, the aim of all training). The particular type pace of the computer teaching process accordingly.
of curiosity studied by FSU, that most relevant to Learner control of the tutorial process would take
the learning process, was given the fancy name of into account the fact that the student himself may
epistemic curiosity, which merely referred to knowl- very well know better than anyone else when he is
edge-seeking curiosity behavior. Research by FSU prepared to tackle the next task. Research is also
indicated that, when levels of curiosity are high, required to show what types of information and
levels of anxiety are low. Given the debilitating skills can best be taught by computer, and to deter-
effect of high-anxiety on performance and mental mine to what extent the costs involved can be amor-
functioning, it can readily be seen that maximizing tized through many additional uses of the computer
curiosity to minimize anxiety has definite impli- both ashore and onboard ship. Examples are record
cations for an optimal learning environment. keeping, job aids, instant technical manual update,
and the like. The possibility of using satellites
Computer-Managed Instruction for remote-source instructional input to the com-
Project ENRICH, another major FSU research di- puter on a ship should also be investigated.
rector, refers to a CAI/CMI effort undertaken by the
Naval Reserve Training Facility (NRTF) in Tallahas- Another effort which could be pursued with ad-
see with the very close support of the FSU CAl Cen- vantage would explore the use of the visual-display
ter. What is CMI? It stands for Computer-Managed capabilities of computers in CAl. Computer graphics
Instruction, and, in contrast to CAl, refers to the might allow evaluation of the extent to which "one
off-line use of the digital computer to collect and picture is worth a thousand words" in a particular
analyze data about a student's cumulative perform- pedagogical process. The computer can, among other
ance and session-to-session learning progress, and things, show three-dimensional representations, move
then to diagnose his learning problems and make complex figures through space, and depict the flow
individualized decisions with regard to the optimum of electricity in electronic circuits.
next learning step for the trainee. In CMI, then,
the computer is not in the loop with the learner; Finally, there is need to evaluate the instruc-
rather, it serves as a record keeper, test scorer, tional effectiveness of CAl relative to conventional
decision-maker, and selector of appropriate remedial approaches. CAl, used in its most flexible way --
material. interactively, with learner control -- calls for a
continual restructuring of content to adapt in real
Although CMI can playa valuable role in the in- time to a students' needs and abilities. In com-
structional domain, the technology behind using a parisons of this approach to older methods, new
computer mainly to store information and process kinds of base-line criteria may be required. Ob-
data is not really central to instructional psychol- viously, cost, although not an instructional cri-
ogy or the tutorial side of education. The FSU re- terion, will ultimately be a significant consider-
search involved both CAl and CMI, in that it focused ation. 0
on using the computer to manage the training of, and
do some instruction for, Seaman Recruit Reserves in
the subject of Basic Military Requirements (BMR). Unsettling, Disturbing, Critical
The material programmed on the computer by the NRTF
was taken from the Test Manual of the BMR Corres- Computers and Automation, established 1951 and
pondence Course for advancement to pay grade E-2. therefore the oldest magazine in the field of com-
Part of the material was taught on a CRT display puters and data processi ng, believes that the pro-
under computer control. Part was monitored self fession of information engineer includes not only
study, assigned by the computer, and part was home- competence in handling information using computers
work to read selected BMR chapters or to complete and other means, but also a broad responsibility,
Correspondence Course assignments. The effective- in a professional and engineering sense, for:
ness of the program was determined by comparing the -- The reliability and social significance
performance of the Seaman Recruits trained with CMI of pertinent input data;
procedures to that of recruits of comparable ability
who were conventionally trained at NRTF, Tallahassee, -- The social value and truth of the
during previous years. The main measure of perform- output results.
ance achieved was the Standard Navy Advancement Ex-
amination for Seaman Apprentice. Unfortunately, al- In the same way, a bridge engineer takes a pro-
though 30 Seaman Recruits were requested, only six fessional responsibility for the reliability and
were made available. Although their average score significance of the data he uses, and the safety
on the final exam was no better than the average of and efficiency of the bridge he builds, for human
the Seaman Recruits in the comparison group, they beings to risk their lives on.
reached this level of achievement in about 33% less
time. Accordi ngly, Compu ters and Au tomati on publi she s
from time to time articles and other information
Project ENRICH has demonstrated the potential related to socially useful input and output of data
value of computer-aided instruction and management systems in a broad sense. To this end we seek to
in training Naval Reserve personnel. The results publish what is unsettling, disturbing, critical
suggest that it would be worthwhile to carry out -- but productive of thought and an improved and
more definitive studies to determine the range of safer "house" for all humani ty, an earth in whi ch
useful application of computer-assisted procedures our chi ldren and later generations may have a fu-
in various types of Navy training programs. ture, instead of facing extinction.

Assessing Effectiveness The professional information engineer needs to


relate his engineering to the most important and
There are several directions in CAl that could most serious problems fn the world today: war,
usefully be emphasized in the future. To permit nuclear weapons, pollution, the population explo-
optimum utilization of the computer for instruction sion, and many more.
(rather than merely use it as an automated text-

COMPUTERS and AUTOMAliON for January. 1973 13


The Social Responsibility of Computer Specialists
Dr. Harvey S. Gellman
DCF Systems Ltd.
74 Victoria St.
Toronto 210, Ontario, Canada

"We must recognize that the computer specialist that develops a system used by the
public will certainly affect the pUblic. ... The unfortunate thing about technology
is that the adverse effects tend to show up too late."

I would like to begin this article by asking a Item 4. The Apollo space missions would not
question: Can you, the reader, identify any connec- have been feasible without computers.
tions or similarities among the following items?
Item 5. About a year ago, a newspaper account 2
Item 1. The New Yorker magazine in its issue told of a man who never had an oil company
of November 21, 1970 1 bemoaned the fact that credit card, but kept receiving bills from the
the wondrous diversity of strange names in company. He wrote several letters to the
a big, broad and once generous country like company, but his letters to the credit depart-
the United States was being squashed by ment went unanswered and the newspaper quoted
the computer. It refers to ominous signs that his as saying, "It is as if I were not writing
people with long names now face censorship by to anyone at all."
truncation -- at least, in New Jersey. The
magazine describes a letter received by an Similarities or Connections?
individual from the Assistant Director of the
New Jersey Division of Motor Vehicles. Part Now, let me repeat the question I asked at the
of the letter states that " ..• because of space beginning. Can you identify any connections or sim-
limitations, our electronic equipment cannot ilarities among the items I have just described?
produce your name on your license in the exact Are there any common threads that link them? You
manner you have requested. Only one first will probably be able tospot several common threads,
name of not more than nine letters, one middle but I would like to select two:
initial and a surname of no more than thirteen
letters can be printed on the driver license • First, computers can have profound effects on
or registration certificate. people; and these effects can be beneficial
or harmful.
" ••• there are lengthy names which cannot be • Second, excessive emphasis on a systematic
printed in their entirety. In these cases, approach and a careless use of computers can
the last letters will be abandoned." erode our humanity.
Item 2. A few years ago, I went to the Toronto My objectives in this article are:
Airport to meet my son who was returning from
New York. When he was not among the arriving
• to discuss some effects of computers;
passengers on his scheduled flight, Iwent to
• to show that computer specialists play a dom-
the airline agent to find out whether he was inant role in determining how computers affect
booked on the next flight. The airline agent
people; and
was able to press a few buttons on the key- • to discuss the computer specialist's respon-
board of the computer terminal and within sibility to society.
seconds was able to tell me that my son was on
the next flight and would be arriving within
the hour. I found that computer service use- Because of the computer's awesome speed Clnd power,
ful and impressive. many people are beginning to realize that huge files
containing information about people can be assembled,
Item 3. About two years ago a Federal Govern- and they can influence us in profound ways. For ex-
ment department in Ottawa hired a new employee ample, we are not too far away from being able to
to fill an important engineering position.
This man refused to apply for a Social Insur-
ance Number because he felt that it would re- Harvey Gellman is President of DCF Systems Ltd., a
duce his worth as a human being. The man's company of management consultants that specializes
boss tried to help him achieve his objective, in computer information systems. He holds a Ph.D.
only to learn that if a Social Insurance Num- in Applied Mathematics from the Uni versi ty of To-
ber was not issued, the man could not partic- ronto. DCF Systems is the Consulting Division of
ipate in the Federal Government's pension AGT Data Systems Ltd., of which Dr. Gellman is a
plan. After a lengthy exchange of correspon- Vice-President a nd Director. Dr. Gellman ha s
dence and noble efforts, the boss finally de- served onmany national and provincial government
cided to issue a special number on behalf of commissions, and held positions of leadership in
the man (without the man's knowledge) to pre- the management consultant field. In 1966 he was
vent the loss of pension benefits. named winner of the International System Award of
the Association for Systems Management, the first
Based on a talk before the Toronto Section of the Canadian Information Canadian to be so honored.
Processing Society. November 1972

14 COMPUTERS and AUTOMATION for January. 1973


have a credit card computer system that could know But I believe that it is important to insure that
when Mr. Smith entered a highway, where he got off, a personal identification number is not adopted in
what he bought at the liquor store, who paid the Canada either wilfully or by default, without a full
rent for the girl in apartment 4B, and the hotel at examination and public debate of its merits and po-
which Mrs. Smith spent the rainy afternoon last Sun- tential adverse consequences.
day. Does this sound farfetched? It is not!
Some Canadian History
Stolen Credit Cards
In the Canadian House of Commons on April 8,
Mr. Milton Lipson, the vice-president in charge 1964, Mr. Diefenbaker, the leader of the Opposition,
of corporate security at American Express, is proud asked Mr. Pearson, the Prime Minister, whether the
of his computers and especially proud of their abil- Social Insurance Number would be used for income tax
ity to track people who use stolen or invalid cards. records. Mr. Pearson replied, "Certainly not". On
He claims and can demonstrate that his system can December 20, 1967, Mr. J. E. Pascoe, the Member from
track a person using a 'flagged' credit card with a Moose Jaw-Lake Centre, asked Mr. Pearson, the Prime
time delay of less than twenty-four hours. 3 Minister, "Is it now Government policy to make it
mandatory for all Canadians to obtain social secur-
Some of you may recall the news reports last ity numbers before filing this year's income tax re-
year when Yves Geoffroy asked for and was granted turns, as indicated in a recent notice sent out by
Christmas leave from a Canadian Federal penitentiary the Department of National Revenue?" Mr. Pearson
to marry. Geoffroy decided not to return to prison replied, "I would like to look into this matter, Mr.
but his use of an American Express credit card led Speaker, but my impression is that this is the law
police to his hideaway in Spain. 4 My reason for now."
telling you this is not to steer those of you who
want to steal with credit cards away from American The revised Statutes of Canada of 1970 dealing
Express and towards another credit card. I merely with income tax state clearly that, "Every person
want to demonstrate that today's computers are cap- who has filed a return of his income for a taxation
able of keeping track of our actions. year after 1966 and has failed to show therein the
Social Insurance Number that has been assigned to
Valid Credit Cards him or for which he is required by this section to
apply shall be deemed to have failed to complete the
In passing, I might ask, isn't it ironical that information on a prescribed form as required by or
the American Express Company has a more effective pursuant to section 49. 1966-67, c.91, s.21."
computer system to handle its stolen credit cards
than to handle its valid credit cards? In fairness, So you see, when some people argue that we have
I should add that the American Express billing sys- nothing to worry about as long as we have a ben-
tem is much better today than it was two years ago evolent government, I would ask, "Do you consider
and appears to be improving steadily. Mr. Pearson to be malevolent?" And yet, this de-
velopment, in which Pearson played a role, could
Some people say that an honest person does not prove harmful in the-future. I submit that every
need to worry about a computer's ability to track citizen has a responsibility to speak out against
him, or about the existence of massive computer the politicians and bureaucrats who think nothing
files containing information about him. But who is of infringing on a person's freedom, liberty or
to say what constitutes honest or proper behaviour? privacy.
The things we do today may be considered acceptable
today, but will they also be acceptable ten or twen- Potential Effects of Technology
ty years from now?
We need to be concerned about the potential ef-
Blacklists fects of technology on our society. We can see ex-
amples of the effects produced by such technological
For example, there were many talented and crea- developments as the automobile and television. When
tive people in the United States during the depres- we look at computer technology we must admit that it
sion years who were attracted to communist organi- tends to make people depend on machines instead of
zations because their failure to find employment led people. It can therefore drive people apart and
them to become disillusioned with the free enter- make our society less humane.
prise system. In the early 1950's, some of these
people found themselves "blacklisted'" and unable to Some people argue that computer specialists do
find work because of their earlier political affili- not have any significant effects on society. They
ations. And yet in 1972, the President of the Unit- equate the computer specialist with the mathemati-
ed States visited Communist China and all the writ- cian. But we must recognize that the computer spe-
ers and actors who were formerly "blacklisted'" are cialist who develops a system used by the public
now absolved of their old "crimes". will certainly affect the public. A responsible
computer specialist will say, "Computers are tools
Unique Personal Identification Number like bridges. The bridges we build must carry
people and we do not want them to crash." The
Some computer specialists I have spoken with are quality of the systems produced by computer spe-
not concerned about the introduction of a universal cialists, and the use to which these systems are
personal identification number and many are advo- put, will determine whether they have good or bad
cating that the Social Insurance Number should be effects on society.
used in Canada for this purpose. They argue that
if a unique personal identification number were Adverse Effects are Late to Appear
available and used widely in Canada, there could be
economic benefits from using these numbers to ex- The unfortunate thing about technology is that
change data among various governmental and commer- the adverse effects tend to show up too late. They
cial organizations, such as credi t bureaus, chartered are rarely visible in the early stages. So, if we
banks, etc. I expect to see increasing pressure let our information systems develop haphazardly we
from commercial organizations for the adoption of run the risk of losing control of our computer sys-
such a number. tems.

COMPUTERS and AUTOMATION for January, 1973 15


If the computer specialist does not exercise There appears to be a trend today for people to
social responsibility, he may find himself suffering strive for jobs which are enjoyable. But you cannot
both as a computer specialist and as a human being. have excellence if you insist that your work must be
As a computer specialist, he may find himself coming completely enjoyable. An excellent athlete has to
under government regulation. As a human being, he go through a lot of hard work and painful condition-
should never forget that bad systems can affect him ing exercises in order to equip himself to perform
adversely as a citizen. The growth of consumerism excellently.
is not a passing fad and we may get government reg-
ulation if we do not improve our computer systems. The Pianist Gieseking
Dehumanizing
I understand that the wonderful pianist, the late
A recent survey conducted by the American Federa- Walter Gieseking, used to practice diligently. He
tion of Information Processing Societies and Time was not satisfied that he had mastered a piece of
magazine 5 showed that 54% of the respondents believe music until he could play it twenty. consecutive times
without a single error. Much as Gieseking probably
computers are dehumanizing people and turning them
enj oyed playing the pi ano, I am sure that these prac-
into numbers. Sixty-two percent are concerned that
tice sessions could not have been pure joy for him.
some large organizations keep information about mil- And yet, in my opinion, the effort was worthwhile
lions of people. In addition, 53% believe computer- because some of his recordings are rare examples of
ized information files might be used to destroy in- excellence that have given pleasure to many listen-
dividual freedom; 58% feel computers will be used in
ers. The point is that there is no such thing as a
the future to keep people under surveillance. perfect job -- a job that has only pleasure and no
pain. And yet, many people today are looking for
About a year ago, there was a news report 6 of a jobs that are constantly challenging, interesting
lady who received a bill from a department store for
and enj oyable.
$369.78. She had made no purchases. The store
threatened to sue her. The matter was finally set- I know some computer specialists who are good
tled, but the lady believes that her credit record performers as long as they are working on the inter-
has been damaged with other stores. esting parts of a project, but they lose interest
artd perform badly when the time comes to complete
Ralph Nader's Suggestion
the necessary detailed work. They are not interested
Ralph Nader has commented on this problem7 and in the details because working on details is not
challenging enough for them.
has suggested that it is not a computer problem, but
a department store problem. He suggests that we
need to have complaint centres manned by citizens. Achieving Excellence
Many people respect Ralph Nader. I wonder what com-
puter specialists will do when he decides to tackle Fortunately, I have met many computer specialists,
the computer community? I believe it would be a both young and old, who have a realistic recognition
pity if the computer community behaves irresponsibly of the necessary joys and pains of their work and
and brings on itself government regulation. who perform with great competence.
If the picture I have painted so far appears un- I mentioned earlier that to achieve excellence a
duly gloomy, let me make a few comments to balance person must be a fanatic. I believe this is true,
the perspective. I am basically quite optimistic but unfortunately most fanatics are not easy to live
about the future and firmly believe that most cdm- with; so I would be willing to settle for a high le-
puter specialists do and will continue to behave vel of competence and would not insist on excellence.
responsibly towards society. I do not agree with But it is important to emphasize that without a high
the prophets of doom who see nothing but chaos and level of competence, the computer specialist cannot
destruction in our world. These prophets of doom fulfill his duty to society because the results he
tend to ignore man's ability to adapt to change. produces will be deficient.
For example, the New York Times book review of The
Limits to Growth, a gloomy report on the predica- Competence is essential, but it is not enough.
ment of mankind, stated: 8 "If the telephone company The computer specialist should also have a high
were restricted to turn-of-the-century technology, level of integrity and ethical standards.
20 million operators would be needed to handle to-
day's volume of calls. Or, as British editor Norman
Macrae has observed, an extrapolation of the trends The Aircraft Brake Scandal
of the 1880's would show today's cities buried under
horse manure." In April, 1972, Harper's magazine published an
article entitled "The Aircraft Brake Scandal".9 A
Kind-Hearted AND Competent major American corporation received a contract from
an aircraft manufacturer to build brake assemblies
Most computer specialists whom I know are kind- for a new Air Force plane. The brake was designed
hearted. But it is not enough for them to have good by one of the company's most capable engineers, and
hearts, they must also have competence. I do not he in turn assigned the task of producing the final
see how we can have effective systems that produce production design to a newcomer in the company.
beneficial results unless the computer specialists
working on those systems are competent. In fact, if The new engineer conducted some tests of the pro-
I had my chOice, I would prefer them to be excellent totype in accordance with the design and after three
rather than merely competent. / prototype models of the brake system had burned out,
he realized that the fault lay not in defective
To be excellent in something, a person must have parts or unsuitable lining material but in the basic
several essential characteristics. First, he must design of the brake itself. The brake design should
have talent for the work he is doing. Second, he have included five disks instead of four in order to
must enjoy what he is doing. Third, and perhaps provide enough surface area to stop the aircraft
most important, he must be a fanatic. A fanatic is without generating the excessive heat that caused
someone who has excessive enthusiasm. the linings to fail.

16 COMPUTERS and AUTOMATION for January, 1973


The new engineer took his problem to his boss Computer specialists should be less concerned 'wi th
who had designed the brake. but his boss was too the forms of professionalism and more with its sub-
proud to admit that he had made a mistake. stance. The computer specialist can only become a
professional when he demonstrates the abilities of
During the next several months~ many people in a professional. ProfessionalS are known as profes-
the corporation knew of the problems but kept hid- sionals because of their performance records.
ing them from the customer. trying to rationalize
test data to make things look good. Finally. after I believe that the various associations of sys-
several near airplane crashes. the young engineer and tems and computer specialists can play useful roles
another member of the project team told the customer by helping their members earn professional status in
what was happening. Both men resigned from the com- the eyes of their customers. They can do this through
pany. The young man was hired by the customer. The education, through development of performance mea-
other man did not have a university degree and found sures and codes of ethics. The associations could
it more difficult to find employment. He turned to provide guidance to their members on what is right
journalism and is the author of the article in and wrong, and I believe that such guidance could
Harper's. have a pervasive influence on the members' employers.
Lack of Integrity Performance Measurement and Social Responsibility

Now you might ask. ,what is the connection between I know that it is not easy to measure the perform-
the Aircraft Brake Scandal and the integrity of com- ance of systems people, but it can be done. There
.. puter specialists? I suggest that the Aircraft are ways of separating the competent people from the
Brake Scandal was caused by a lack of integrity in incompetent people, and I believe that the "profes-
the design engineer •. I have seen several cases sional associations" should play leading roles in
where computer specialists have been too proud or maintaining some kind of current record about a per-
afraid to admit their mistakes and this has created son's performance.
severe difficulties for their employers. For exam-
pIe. in one case. a computer sys terns manager ,refused I would like to conclude wi,th a brief summary of
to admit to his employer that he and his team were my main points:
not ready to begin operations on a newly installed
computer. As a result. the company found itself • Computers can have profound effects on our
operating with a deficient system. It lost control lives, either beneficial or harmful.
of its warehouse shipments and its accounts receiv- • Computer specialists can playa dominant role
ables and it took a considerable amount of time and in determining what these effects will be.
money to regain control. • If the computer specialist does not fulfill
his responsibility to society he will suffer
Integrity implies that the computer specialist as a human being and as a computer specialist.
should be more service-centred and less self-centred. • The essential requirements for computer spe-
He should be more willing to let his customers be- cialists are competence and integrity.
come involved in specifying what they want in their • "Professional associations" can help their
systems. Some computer specialists behave like some members in both of these areas.
medical doctors~ When a friend of mine was an army
rookie. he had a cold and went to the army doctor.
The doctor asked him what was wrong and my friend I still believe that most Canadians retain a
said. "I have a cold." The doctor barked. "Just steadfast respect for the rights of the individual.
tell me your symptoms. I'll decide whether you I also believe that most computer specialists are
have a cold." In a similar way, some computer spe- good people. They know they should pay more atten-
cialists try to keep their customers in a subordi- tion to the goals of their systems and less atten-
nate position. I find it hard to see how the com- tion to their tools; otherwise they may become the
puter specialist's employer can achieve full bene- tool of their tools.
fits from his computer systems if the computer
specialist is not interested in serving the users We computer specialists know that in the long
of the systems. run, what is good for computer users will also be
good for us. We know that we need to preserve our
I think it is fair to say that most computer competence and integrity, and we know how to do it.
specialists are intelligent and industrious. More- All we need is the will to do it.
over, most of them cherish their freedom. This is
shown by their hatred of standards and rules for References
documentation. If computer specialists cherish
their own freedom, then they should be willing to 1. The New Yorker, November 21, 1970, p. 55.
protect the freedom of computer users and citizens 2. Hanlon, J., Computerworld, September, 1971.
who might be adversely affected by computer systems. 3. Powledge, F., "Learning to Live with the Credit
Card", Esgui re, September, 1971.
Specialist vs. Professional 4. The Toronto Star, March 8, 1972. p. 10.
5. "A National Survey of the Public's Attitudes
You may have noticed that I have kept referring Towards Computers". A joint project of the
to the computer specialist and have not used the term American Federation of Information Processing
computer professional. We hear a lot of talk about Societies and Time Magazine, 1971.
professionalism. Every person working for a living 6. Ross, I., "The Credit Card's Painful Coming-of-
wants to be called a professional. We have profes- Age", Fortune, October, 1971, p. lOB.
sional writers. golfers, salesmen, nurses, hockey 7. Nader, R., "Computers and the Consumer", Compu-
players, musicians, doctors, lawyers and soldiers. ters and Automation,· October, 1970, p. 21.
It is therefore difficult to produce a good defini- B. The Financial Post, April 22, 1972, p. 6.
tion of the word professional. The definition 9. Vandi vi er, Kermit, "The Ai reraft Brake Seanda 1"
which I prefer is: "A. professional is someone who Harper's magazine, April, 1972, p. 45. [J
can do something better than most other people, even
under adverse conditions."

COMPUTERS and AUTOMATION for January, 1973 17


DATABANKS IN A FREE SOCIETY:

A Summary of the Proiect on Computer Databanks

Professor Alan F. Westin


Department of Political Science
Columbia University
420 West 118th Street
New York, N. Y. 10027
and many associates

"Our task is to see that appropriate safeguards for the individual's rights to
privacy, confidentiality, and due process, are embedded in every major record
system in the nation."

Based on a summary of the Project on Computer Databanks and of its report "Databanks in a
Free Society" published 1972 by Quadrangle Books, a New York Times Company, 330 Madison
Ave., New York, N.Y. 10017.

The United States has become a records-oriented that far more personal data might be assembled about
society. the individual than it had been feasible to collect
before; that much greater sharing of confidential
In each major zone of personal and CIVIC life information might t~ke place among the holders of
(education, employment, credit, taxation, health, computerized records; and that there might be a les-
welfare, licensing, law enforcement, etc.), formal, sening of the individual's ability to know what rec-
cumulative records are assembled about each of us ords have been created about him, and to challenge
by hundreds of private and government record-keeping their accuracy or completeness.
organizations. These personal histories are relied
on heavily by the collecting organizations in making The book Databanks in a Free Society (currently
many decisions about our rights, benefits, and op- being published by Quadrangle Books, a New York Times
portunities. Informal networks for sharing record- subsidiary) is the report of the first nationwide,
information among public and private organizations factual study of what the use of computers is actu-
have become a common feature of organizational life ~ doing to record-keeping processes in the United
heavily dependent On credentials. States, and what the growth of large-scale data-
banks, both manual and computerized, implies for
During the past two decades, as most government the citizen's constitutional rights to privacy and
agencies and private organizations have been comput- due process. This article is a summary of the book.
erizing their large-scale files, the American public The book also outlines the kinds of public policy
has become concerned that dangerous changes might be issues about the use of databanks in the 1970's that
taking place in this record-keeping process. Because must be resolved if a proper balance between the in-
of the computer's enormous capacities to record, dividual's civil liberties and society's needs for
store, process, and distribute data, at great speeds information, is to be achieved.
and in enormous volumes, many people have feared
How the Study was Conducted
Alan F. Westin is Professor of Public Law and Gov-
ernment at Columbia Uni versi ty and a member of the The book is the report of the "Project on Computer
District of Columbia Bar. For the past two decades Data Banks", a three-year research study conducted
he had written about the law and politics of civil under the auspices of the Computer Science and Engi-
liberties and civil rights. In 1968 he received neering Board of the National Academy of Sciences,
several nati onal awards for hi s book Pri vacy and under grants of $164,000 from the Russell Sage Founda-
Freedom, a comprehensive study of the social and tion. The Director of the Project was Dr. Alan F.
political functions of privacy in a democratic so- Westin, Professor of Public Law and Government, Co-
ciety. Prof. Westin is a member of the National lumbia University, and author of Privacy and Free-
Academy of Sci ences' Computer Sci ence and Engi neer- dom, published in 1967. An inter-disciplinary staff
ing Board and served as Director of the Academy's of seven scholars from the fields of law, computer
Proj ect on Computer Databanks, 1969-72. He is science, and the social sciences collaborated in the
also Chairman of the American Civil Liberties research. The project received continuing guidance
Union's Pri vacy Commi ttee and a member of the ACLU not only from the Computer Science and Engineering
National Board. Board but also a special Advisory Board of 18 promi-
nent figures in public life whose views spanned the

18 COMPUTERS and AUTOMATION for January, 1973


full spectrum of opInIon on issues of databanks and Mutual of Omaha Insurance Company
civil liberties.* The final report of the project R. L. Polk & Company
was written by Dr. Westin and Mr. Michael A. Baker, Massachusetts Institute of Technology
Assistant Director of the Project and an Instructor Church of Latter Day Saints
in Sociology at Brooklyn College of the City Univer- Office of Research, American Council on Edu-
sity of New York. cation
Kaiser-Permanente Health Plan
Sources
Part III has three chapters which present and ana-
The major sources collected and used by the Proj- lyze the Project's principal findings. These include
ect include: an overview of what kinds of files have and have not
been computerized in advanced organizations; an anal-
1. Documentary materials on computerized record ysis of computer effects on civil liberties that are
systems in more than 500 government agencies not taking place as yet; and a description of those
and private organizations. changes in record-keeping that the use of computers
and communication systems is producing in these or-
2. Detailed on-site staff visits to 55 of the ganizations.
most advanced computerizing organizations,
ranging across the most sensitive fields of Part IV is an analysis of the way in which the re-
personal record-keeping. ception of computer technology is affected by organi-
zational, legal, and socio-political factors, fol-
3; Replies from over 1500 organizations in a na- lowed by a forecast of developments in new computer
tional mail survey of developments in comput- and communications technologies that are likely to
erization and record-keeping among government occur in the remainder of the 1970's, and an analy-
agencies and private organizations. sis of their implications for civil liberties in-
terests.
4. Extensive interviews with officials from com-
puter companies, software houses, systems con- Part V discusses public policy choices in the
sulting firms, industry associations, civil 1970's in light of the project's findings and fore-
liberties groups, labor unions, consumer or- casts. The first chapter analyzes the larger so-
ganizations, minority-rights organizations, cio-political significance of the computer's arri-
and professional associations. val in the late 1950's and 1960's; it goes on to
suggest the basic civil liberties principles that
5. Legal, legislative and regulatory-agency ma- ought to be followed when seeking to safeguard citi-
terials dealing with databank issues in 25 zen rights in large-scale record systems, especially
distinct major fields of personal record-keep- in the increasingly computerized sectors of American
ing. organizational life. The final chapter of the re-
port presents an agenda for the 1970's, identifying
6. Materials and interviews on the state of data- six areas of priority for public policy and civic
bank developments and regulatory controls in action.
23 foreign nations, for purposes of comparison
with the United States. Three appendixes to the report present: the re-
sults from the Project's survey of organizations;
Organization of the Report an analysis of public opinion literature on privacy
and the computer; and information about the experi-
The Report is organized into five parts: ence of other advanced industrial nations in dealing
with the databanks-and-privacy problem.
Part I presents a brief, orienting discussion of
computer systems and civil liberties concepts for Highlights of the Report
general readers.
A great many commentators have warned that the
Part II consists of "profiles" of 14 governmental,
spread of computers is fundamentally altering the
commercial, and private organizations, drawn from the
balance between information policies of organiza-
55 to which the Project staff made on-site visits.
tions and individual rights to privacy that marked
Each profile describes the nature and function of the
past eras of record-keeping. Compared to what was
organization, its pre-computer record-keeping, its done in the manual era, it is said, the new capaci-
move into computer usage, the effect of automation on ties of the computer inevitably lead organizations:
its record-keeping about people, previous civil lib- to collect more detailed and intrusive personal in-
erties issues involving the organization's manual formation about individuals; to consolidate confi-
record-keeping, the effect of computerization on dential information from previously separate files;
civil liberties protections, and the organization's
and to share confidential personal data with govern-
plans for further computerization in the next five
ment agencies and private organizations that had not
years.
received it before.
The 14 organizations given this detailed treat-
ment are: The Project's findings from visits to 55 organi-
zations with highly advanced computer applications
is that computerization is not yet having such ef-
The U.S. Social Security Administration
fects in the overwhelming majority of such organiza-
The F.B.I. 's National Crime Information Center tions. For a combination of technological and or-
Kansas City (Missouri) Police Department ganizational reasons, central databank developments
New York State Department of Motor Vehicles are far from being as advanced as many public com-
City of New Haven, Connecticut
Santa Clara County, California mentaries have assumed. Organizations have so far
Bank of America failed to achieve the "total" consolidation of their
TRW -- Credit Data Corporation information about individuals which raised civil lib-
erties alarms when such goals were announced in the
* Names of staff and Advisory Board members appear 1960's by various government agencies or private or-
later in this summary. ganizations.

COMPUTERS and AUTOMATION for January. 1973 19


Continuance of Policies Efficiency
Further, in computerizing their records on indi-
viduals, organizations have generally carried over Computerization in advanced organizations is pro-
the same policies on data collection and sharing ducing changes in record-keeping methods that can
that law and administrative traditions in each field increase the efficiency with which organizations
had set in the pre-computer era. Where new law or carry out their basic decision-making about the peo-
practices have evolved to protect individual liber- ple they process or serve. Computerization is mak-
ties over the past decade, organizations with com- ing it possible for many organizations to: maintain
puterized systems have followed such new policies more up-to-date and complete records; obtain faster
as fully as those that still use manual files and responses to inquiries about a given individual; and
procedures. Even the most highly computerized or- make more extensive use of information already in
ganizations continue to rely heavily on manual rec- the files. Computers have also made possible dra-
ord-keeping and retain in their paper files the most matic expansion of networks for exchange of data
sensitive personal information they possess. among organizations that have shared data since pre-
computer days; and the creation of some large data
Another widely held fear is that computerization bases of information about people that would not
makes it more difficult for the individual to know have been feasible without automation. These changes
what is in the file about him, to have errors cor- have been felt already in police information sys-
rected, or have the data erased where public policy tems, national credit reporting systems, charge
specifies that certain information about an indi- card systems, and others.
vidual's past should be ignored.
Data-Sharing
The Project's inspection of advanced systems
showed that notice to the individual about a Looking at technological trends for the remaining
record's existence, opportunity to inspect and years of the 1970's, the Report forecasts that while
challenge that record, and policies as to the re- there will be important continued increases in com-
moval of out-of-date or irrelevant information were puter capabilities, no developments are now foresee-
not being substantially altered by computerization. able that will alter the technological, organiza-
Where policies affording individuals rights of due tional, and socio-political considerations that pre-
process such as the above had been provided in an sently frame the databanks and civil liberties issue.
organization prior to computerization, those rules Organizations will have more flexible, reliable, and
are being followed in the new computerized systems cost-effective computer systems to use in pursuit
as well. Where no such rights were given, the of their policies, but these will not represent a
adoption of computers has not made the situation radical departure from the computer capabilities
either worse or better. Neither has computerization presently available. The most important development
introduced impersonal decision-making in systems with implications for civil liberties interests will
where this was not present before, nor forced organ- be an increase in the ease with which data can be
izations into greater reliance on "the record" in shared among organizations which have computers,
making decisions about clients, customers or citi- coupled with a reduction in the cost of doing so.
zens. Where abuses along these lines were present This will make it imperative that legal boundaries
in computerized systems -- raising serious due pro- as to data-sharing are set as clearly as possible.
cess questions -- they had been carried over from
the high-volume "processing" of people in the manual Augmenting the Power of Organizations
era.
The Project concluded that the real issue of
Public Misunderstanding databanks and civil liberty facing the nation today
is not that revolutionary new capacities for data
Over and over again, the Project's findings indi- surveillance have come into being as a result of
cate profound public misunderstanding about the ef- computerization. The real issue is that computers
fect of computers on large scale record systems. To arrived to augment the power of organizations just
some extent, the inflated claims and proposals of when the United States entered a period of funda-
organizational managers about the capacities of mental debate over social policies and organization-
their computer systems helped to generate what were al practices, and when the traditional authority of
in fact baseless concerns for privacy on the part government institutions and private organizations
of the public. has become the object of wide-spread dissent.
In addition, as the Report shows with respect to Challenge of Goals
law enforcement uses and airline-reservations and
charge-card systems, many commentators on computers Important segments of the population have chal-
and privacy issues have failed to do adequate re- lenged the goals of major organizations that use
search into the actual operations of systems about personal records to control the rights, benefits,
which they write, and have presented entirely in- and opportunities of Americans. There is also de-
correct pictures to the press and public about how bate over the criteria that are used to make such
these computer systems work. The danger in this, judgments (religious, racial, political, cultural,
the report points out, is that we may give up the sexual, educational, etc.), and over the procedures
fight in the belief we have already lost: by which the decisions are reached, especially those
that involve secret proceedings and prevent indivi-
If we assume that computer users are already duals from having access to their own records.
doing things that they are not, we risk sur-
rendering without a fight the border between Distrust of Organizational Record-Keeping
properly limited and surveillance-oriented
computer applications ••• ~ The question of Computers are making the record-keeping of many
what border control measures should be adopted organizations more efficient precisely at the mo-
can hardly be understood and properly consid- ment when trust in many large organizations is low
ered •.. if the public and opinion leaders and when major segments of the American population
assume that the borders have already been are calling for changes in values that underly var-
obli terated. ious social programs. for new definitions of per-

20 COMPUTERS and AUTOMATION for January. 1973


sonal rights, and for organizational authorities to As a case study in how not to build new record
make their decision-making procedures more open to systems, the Report discusses some of the major
public scrutiny and to the review of specific indi- Administration and Congressional proposals for
viduals involved. national welfare reform, which generally hinge on
the availability of computers for massive data
Little Legislation
storage and exchange. Several of the welfare sys-
tem proposals contain "sweeping authorizations for
Despite the rapid spread. of computers, there has data collection and sharing but almost nothing by
been little so far by way of new legislation, judi- way of confidentiality standards and due-process
cial rulings, regulatory-agency rules, or other le- review procedures." The Report points out that we
gal remedies defining new rights to privacy and due may be "creating one of the largest, most sensitive,
process in major record systems. The Report stresses and highly computerized record systems in the na-
that, because of the increased efficiency of record- tion's history, without explicit protections for
keeping and the growing intensity of the pUblic's the civil liberties of millions of persons whose
concern, the middle 1970's is the moment when law- lives wi 11 be profoundly affected ... "
makers and the public must confront both long-stand-
ing and newly-raised civil liberties issues, and Records of the Wrong Kind
evolve a new structure of law and policy to apply
principles of privacy and due process to large-scale Limit the collection of personal information
record-keeping. where a proper regard for the citizen's right to
privacy suggests that records ought not to be main-
The Report identifies six areas of priority for tained at all by certain organizations, or never
public action, and presents examples of specific furnished for certain uses in the society: Among
policy measures under each of these that ought to the examples are the use of arrest-only records in
be seriously considered by policy makers: licensing and employment decisions, and the selling
to commercial advertising services of names and ad-
dresses collected by government under its licensing
Right of Access and Challenge and regulatory powers, unless the individual speci-
fically consents to such use.
Development of laws to give the individual a right
of access and challenge to almost every file in which In the case of arrest records, the Report stres-
records about him are kept by city, county, state, or ses that:
government agencies: At stake here is the possibility
that, denied access to records being used for deci- A democratic society should not allow ar-
sions about himself, the citizen is left with "feel- rest records to be collected and circulated
ings of powerlessness and the conviction that gov- nationwide with increasing efficiency without
ernment authority is fundamentally arbitrary." considering directly the actual social impact
of their use in the employment and licensing
At the very least, citizens ought to know what spheres, and without examining the possibility
record systems exist in government agencies. A that dissemination beyond law-enforcement
Citizen's Guide to Files, published at every appro- agencies represents an official stigmatiza-
priate level of government jurisdiction, should tion of the citizen that ought to be either
"provide the citizen with a thorough, detailed and forbidden by law, or closely regulated.
non-technical directory of the record systems that
contain information about him, and the general rules Social Policy
under which it is being held and used." Providing
adequate due process protection in government files, Increased work by the computer industry and pro-
the Report suggests, is best achieved by assuming fessionals within it on technological safeguards
that any individual should be able to see and get which will make it possible to implement confiden-
a copy of any records used to affect him or her tiality policies more effectively than is now fea-
personally - wi th the record-keeping agency "bear sible: The Report notes that:
ing the burden of proving that some specific pub-
lic interest justifies denying access." No 'technological fix' can be applied to the
databank problem. Protection of privacy is
Explicit Rules a matter of social policy, on which computer
profes si onal s are fellow-ci tizens, not experts.
Develop of explicit laws or rules balancing con-
fidentiality and data-sharing in many sensitive re- But the Project calls for more research, development
cord systems that today do not have clearly defined and testing efforts to be undertaken by the comput-
rules: Among these would be rules governing the pro- er industry to see that the computer's capacities
vision of information to law enforcement agencies for protection of confidentiality and insurance of
from bank accounts, travel and entertainment card proper citizen access are turned into "available
records, airline and hotel reservation systems, and workable products". Law and public pressure,
etc. The Report predicts that one or two large the Report suggests, require that such measures be
systems will come to dominate in each of these areas. taken by managers of sensitive record systems when
they are computerized, thereby stimulating the "user
This development will make the individual's demand" to provide a practical market for such de-
account record more comprehensive and a very vices and techniques.
inviting target for investigators of all
kinds. With that rise in sensitivity and No Extension of Use of Social Security Number
attractiveness ought to go legislative en-
actments spelling out retention and destruc- Reconsideration by Congress and the executive
tion policies, confidentiality rules, and branch of the current permissive policies toward use
procedures for protecting individual rights of the social security number in an increasing num-
when outsiders seek to obtain access for ber of government and private record systems: The
what are asserted to be lawful and necessary Report notes that having such a number is not a pre-
purposes. requisite for linking files within or between or-

COMPUTERS and AUTOMATION for January. 1973 21


~anizations, but notes that a common numbering sys- solve our current dilemmas by thinking that
tem clearly makes record linkage easier and cheaper. earlier ages had magic answers.
Further, the Project concludes that resolving the
critical civil liberties issues in record keeping Computers are here to stay. So are large or-
"will require that a minimum level of trust be ganizations and the need for data. So is the
maintained between American citizens and their gov- American commitment to civil liberty. Equally
ernment. Under these conditions, adopting the so- real are the social cleavage~ and cultural
cial security number as a national identifier or reassessments that mark our era. Our task is
letting its use spread unchecked cannot help but to see that appropriate safeguards for the
contribute to public distrust of government." individual's rights to privacy, confidential-
ity, and due process are embedded in every
Information-T ru st Agencies major record system in the nation, particu-
larly the computerizing systems that promise
Experimentation with special information-trust to be the setting for most important organi-
agencies to hold particularly sensitive bodies of zational uses of information affecting indi-
personal data: For example, the Report suggests viduals in the coming decades.
that the handling of both national crime statistics
and summary criminal histories ("rap sheets") might Notes
be taken away from the Federal Bureau of Investiga-
tion and placed in an independent national agency Staff and Advisory Bodies to the Project
under control of a board that would have public
representatives as well as law enforcement offi- Staff Associates for the Project were:
cials on it. Such an agency would have to be es-
tablished "with a clear legislative mandate to be Robert F Boruch, Assistant Professor, Department
a 'guardian' institution," paying attention to of Psychology, Northwestern University
civil liberties interests as well as law enforce- Howard Campaigne, Professor of Mathematics, Slip-
ment needs. pery Rock State College
Gerald L. Grotta, Associate Professor of Journalism,
Critical Period, 1973-78 Southern Illinois University
Lance J. Hoffman, Assistant Professor of Electrical
The Report stressed that the next five years Engineering and Computer Sciences, University of
would be a critical period in the reception and California, Berkeley
control of sensitive personal record systems, es- Charles Lister, Attorney at Law, Washington, D.C.
pecially those managed by computers. More sensi-
tive areas of record-keeping are being entered by Advisory Group
many computerizing organizations; many larger on-
line (instant access) networks are being brought The Proj ect had duri ng its exi stence an Advi sory
into operations; and more consolidations of pre- Group that provided the staff with a wide range of
sently scattered records about individuals can be diverse viewpoints on the databanks and civil lib-
seen as a trend in certain areas, such as criminal erties issue and helped shape the project's stud-
justice, credit and financial transactions, and ies. Members of the Advisory Group were:
welfare. The Report stresses that unless lawmakers
and organizational managers develop proper safe- Edgar S. Dunn, Jr.
guards for privacy and due process, and create Resources for the Future, Inc.
mechanisms for public scrutiny and review, the re- The Honorable Cornelius E. Gallagher
cord systems they are building could sharpen the House of Representatives
already serious debate in American society over the Richard Freund
way to apportion rights, benefits, and opportuni ties First National City Bank
in a credential-oriented society, and leave organi- Justice Nathan L. Jacobs
zational uses' of records to control individual fu- New Jersey Supreme Court
tures too far outside the rule of law. Nicholas deB. Katzenbach
Vice President and General Counsel, IBM Corp.
In its closing paragraphs, the Report sums up the John H. Knowles
databanks and civil liberties problem as follows: President, Rockefeller Foundation
Arthur R. Mi ller
If our empirical findings showed anything, Professor of Law, Harvard University Law School
they indicate that man is still in charge of George A. Miller
the machines. What is collected, for what Institute for Advanced Study, Princeton, N.J.
purposes, with whom information is shared, Ralph Nader
and what opportunities individuals have to Attorney, Washington, D.C.
see and contest records are all matters of Arthur Naftalin
policy choice, not technological determinism. Professor of Public Affairs, Univ. of Minnesota
Man cannot escape his social or moral respon- Anthony G. Oettinger
sibilities by murmuring feebly that "the Ma- Harvard University
chine made me do it." John R. Pierce
California Institute of Technology
There is also a powerful tendency to roman- The Honorable Ogden R. Reid
ticize the pre-computer era as a time of ro- House of Representatives
bust privacy, respect for individuality in L. F. Rei ser
organizations, and "face-to-face" relations Corporate Director, Personnel and Industrial
in decision-making. Such arcadian notions Relations, CPC International Inc.
delude us. In every age, limiting the arbit- Richard Ruggles
rary use of power, applying broad principles Department of Economics, Yale University
of civil liber~y to the troubles and chal- Roderick O. Symmes
lenges of that time, and using technology to Director, Data Systems & Statistics Staff, U.S.
advance the social well-being of the nation Dept. of Housing and Urban Development
represent terribly hard questions of public Roy Nutt
policy, and always will. We do not help re- Vice President, Computer Sciences Corporation []

22 COMPUTERS and AUTOMATION for January. 1973


ANNUAL INDEX
for Volume 21, 1972
of

COrn~H~!!!:i!
A -- III," by Neil Macdonald, "Encouragement for the Pursui t Jaffin, "Missing Issues of in Indochina," 21/2 (Feb.), 41
21/2 (Feb.), 29 of Truth," 21/11 (Nov.), 38 'Computers and Automation'," Bress, Dennis L., "Computers and
ASCII, "Amer ican St andard Code "Architecture Students Turning Bell Telephone Laboratories, 21/5 (May), 28 Cartography," 21/8 (Aug.), 25
for Information Interchange," to Computer 10 Improve Design, "No.4 ESS Will Triple Toll Berkeley, Edmund C., and Jim Bright, Herb, "SHARE and the
21/6B (Aug.), 180 Creativity," 21/5 (May), 42 Call Capacity," 21/8 (Aug.), 45 Johnson, "Subscription Error s: Mult iply Carry Bug," 21/2
Abzug, Bella, and Helsingen Sano- Arithmetical tables, "Some Basic Bellin, Judy, and Helsingen Sano- C&A Will Correct," 21/11 (Nov.), (Feb.), 50
mat, Ian Low, Judy Bellin, Ed- Ari thmetical Tables," 21/6B mat, Ian Low, Bella Abzug, Ed- 39 Brooks, Jack, "What Have Compu-
mund C. Berkeley, "How Fiendish (Aug.), 179 mund C. Berkeley, "How Fiend- Berkeley, Edmund C., and John ters Done for Us Lately?," 21/
Can You Get?," 21/5 (May), 31 Arrests, "Computer Increasinq ish Can You Get?," 21/5 (~Iay), Kaler, "Unhappy Subscriber to 10 (Oct.), 7
"Academic Computer Practices, and Criminal Arrests by 10 Per Cent," 31 Satisfied One," 21/7 (July), Bryant, Thomas D., and Mrs. Ruth
Their Deficiencies," by Dr. 21/7 (July), 42 "Benchmarking vs. Simulation, tI 38 Shapin, Mrs. Lucy Bell, William
Herbert E. Humbert, 21/5 (May), Art contest, "Tenth Annual Com- by Fred C. Ihrer, 21/11 (Nov.), Berkeley, Edmund C., and Arthur H. Wynne, Rainer M. Goes, "En-
16 puter Art Contest": 21/5 (May), 8 Martin, "Computer-Field Infor- couragement for the Pursuit of
Accounting Principles Board, 40; 21/6 (June), 41; 21/8 (Aug.), Berezin, Evelyn, "How Technology mation vs. Social Rag," 21/7 Truth," 21/11 (Nov.), 38
"IBM's Powerful Partner: The 8 Is Freeing the Secretary," 21/ (July), 36 "Building Your Own Computer --
Accounting Principles Board," Art curriculum, "Computer Science 10 (Oct.), 15 Berkeley, Edmund C., and Peter Part II," by Stephen Barrat
from Samson Science Corp., 21/ Is Added to COllege's Art Cur- Berkeley, Edmund C.: "Achieving J. Nyikos, "The Neglect of Gray, 21/1 (Jan.), 20
4 (Apr.), 31 riculum," 21/3 (Mar.), 40 'Personal' Response from a Significant Subjects, and the Bundy, McGeorge, "Spotlight on
"Achieving 'Personal' Response Artists, "Computer Artists," 21/ Computer," 21/3 (Mar.), 6 Information Engineer," 21/7 McGeorge Bundy and the Whi te
from a Computer," by Edmund C. 8 (Aug.). 19 "Barriers in Applying Compu- (July),30 House Situation Room, November
Berkeley, 21/3 (Mar.), 6 Ass assination: "Dallas: Who, ters," 21/7 (July), 24 Berkeley, Edmund C., and Fred- 22, 1963," by Robert B. Cutler,
"The Activities of the Central How, Why? Part II," by Mik- "Bernard L. Barker: Portrait eric O. Parlova, "CDC vs IBM," 21/1 (Jan.), 57
Intelligence Agency, at Six hail Sagatelyan, 21/4 (Apr.), of a Watergate 8urglar," 21/ 21/4 (Apr.). 32 "Bunker-Ramo Activates New Nation-
Billion Dollars a Year," by 37 11 (Nov.), 26 Berkeley, Edmund C., and Mont- wide Market Data System," 21/
Edmund K. DeLong, 21/2 (Feb.), "Political Assassination in the "Books": 21/10 (Oct.), 34; 21 gomery Phister, Jr., "Post- 10 (Oct.), 45
38 United States," 21/5 (May). 7 /11 (Nov.), 40 Maturity in the Computer Field," Bunker-Ramo Corp., "Telephone-
ADAPSO, "Justice Department In- "The Assassination of Senator "Chess and Computers," 21/9 21/12 (Dec.), 6 Sized Computer, BR-1018, Moves
terested in ADAPSO Hearings," Robert F. Kennedy: Proofs of (Sept.), 6 Berkeley, Edmund C., and Tore Into Production," 21/10 (Oct.),
21/3 (Mar.), 41 Conspiracy and of Two Persons "Common Sense, Wisdom, General Rambol, "On the JJ Command," 45
ADVANCED ND~IlLES, by Neil Mac- Firing," by Richard E. Sprague Science, and Computers - II," 21/10 (Oct.), 37 Burton, Joseph M., Clerk, "Dis-
donald: 21/3 (Mar.), 45; 21/4 and William W. Harper, 21/9 21/1 (Jan.), 11 Berkeley, Edmund C., and Helsin- trict's Superior Court Uses
(Apr.), 43; 21/5 (May), 33; 21/ (Sept.), 24 "Computers and Spelling," 21/ gen Sanomat, Ian Low, Judy Bel- Computer To Keep Track of
6 (June). 42; 21/7 (July), 26 Association for Computing Mach- 11 (Nov.), 6 lin, Bella Abzub, "lIow Fiend- 100,000 Criminal Cases," 21/2
"Adversity" (Computer Art), by inery, "Horizons and Rebellion," "The Construction of Living ish Can You Get"I," 21/5 (May), (Feb.), 52
James Lipscomb, 21/8 (Aug.), 9 by Edmund C. Berkeley, 21/9 Robots -- Part 1," 21/8 31 Bush, "Eight Photographs of a
"Aerial Photography and Computers (Sept.), 36 (Au.g.), 27 Berkeley, Edmund C., and Thomas Bush: Pictorial Reasoning
Aid the Bat tIe Against Bl ight Association of Data Processing "Counting the Number of Appli- Stamm, "The Shooting of Presi- Tests -- Part 7," by Neil Mac-
and Pollution," by Dr. David Service Organizations, Inc., cations of Computers," 21/6B dential Candidate George C. donald, 21/10 (Oct.), 27
Landgrebe, 21/1 (Jan.). 48 "Justice Department Interested (Aug.), 3 Wallace: A Systems-Analysis "Business Programmer Exam Announ-
"Air-Pollution Game To Deal with in ADAPSO Hearings," 21/3 (Mar.), "The Curse of a Magazine," 21/ Discussion," 21/7 (July), 32 cements and Study Guides Now
Environmental Problems," by 41 2 (Feb.), 6 "Bernard L. Barker: Portrait of Avail able," 21/9 (Sept.), 42
Prof. Matthew J. Reilly. 21/1 "Association for the Prevention "The Death of the Democratic a Watergate Burglar," by Ed- Business Week, and Richard E.
(Jan.),50 of Doomsday -- News and Ideas," Party Candidate for the Pres- mund C. Berke ley, 21/11 (Nov.), Sprague, Norman R. Carpenter,
"The Alaska Pipeline Heading Les- 21/10 (Oct.), 36 idency, 1972," 21/5 (May), 6 26 "3400 Organizations Required
son." by Stewart M. Brandborg, Associations, "Roster of Computer "Ueciphering an Unknown Computer 8ernert, Philippe, and Camille by Court Order to Furnish Con-
21/6 (June). 30 Associations," 21/6B (Aug.), Program, as Compared with De- Gilles, "Le Francais Qui Devait fidential Data to IBM - II,"
Alexander, Jame s p .. "Operat ion 168 ciphering of Ancient Writing," Tuer Kennedy (The Frenchman Who 21/3 (Mar.), 19
Clean Sweep -- A Ci ty' s War on Aston, William W., "Personal 21/5 (.Ilay) , 19 Was To Kill Kennedy)," 21/12 Busing, '''Computers Enter the
Crime," 21/2 (Feb.), 51 Rapid Transi t, Computerized, in "Doomsday -- Class A Hazards," (Dec.). 38 Busing Controversy' -- Addendum,"
Algebra, "New Algebra Option Morgantown, West Virginia, Part 21/11 (Nov.), 38 Black colleges, "Faculty Loans by Robert L. Glass, 21/4 (Apr.),
Promises Breakthrough in Cal- I: The Plan," 21/6 (June), 11 "Eight Hundred People Interes- to Black Colleges," by E. Nan- 7
culator Programming," 21/8 Athearn, Inc., "Computer Keeps ted in Mechanical Brains," as, 21/2 (Feb.), 52 Buyers' Guide, "Computer Directory
(Aug.), 44 'Railroad' Running Smoothly," 21/1 (Jan.), 7 Blight, "Aerial Photography and and Buyers' Guide, 1972": 21/7
American Friends Service Cammi t- 21/3 (Mar.), 40 "Fall Joint Computer Conference: Computers Aid the Battle Again- (July), 50; 21/8 (Aug.), 39;
tee, "Pacification: The Story Axioms, "EDP Axioms -- A Critical Topics," 21/4 (Apr.), 33 st Blight and Pollution," by 21/9 (Sept.), 39; 21/10 (Oct.),
of Ba Toi." 21/7 (July), 37 Analysis," by W. Leon Sanford, "Horizons and Rebellion," 21/ Dr. David Landgrebe, 21/1 (Jan.), 34; 21/11 (Nov.), 40; 21/12
"American Standard Code for In- 21/5 (.Ilay) , 12 9 (Sept.), 36 48 (Dec.), 51
formation Interchange, ASCII," "The House Is on Fire": 21/2 Blind, "M.1.T.-Braillemboss Be- Buyers' Guide: "The Computer Dir-
21/6B (Aug.), 180 (Feb.), 37; 21/8 (Aug.), 38 ing Used by Blind IRS Represen- ectory and Buyers' Guide Is-
Ancient writing, "Deciphering an "Hurray for the Univac Di vi sian tative," 21/9 (Sept.), 43 sue 1973 -- Notice," 21/6B
Unknown Computer Program, as of Sperry Rand," 21/1 (Jan.), Bache, Raymond E., "The High Cost (Aug.), 178
Compared with Deciphering of BR-1018, "Telephone-Sized Compu- 6 of Vendor's Software Practices: "Free Entries for Your Organi-
Ancient Writing," by Edmund C. ter, BR-1018. Moves Into Pro- "The Most Important of All Why?," 21/12 CDec.), 20 zation in the 1973 Computer
Berkeley, 21/5 (May). 19 duction," 21/10 (Oct.), 45 Branches of Knowledge": 21/ Bombing, "North Vietnam and Amer- Directory and Buyers' Guide
"Annual Index for Volume 20, 19- Ba Toi, "Pacification: The Story 1 (Jan.), 36; :!1/2 (Feb.), 2; ican Bombing: Six American Issue -- Notice," 21/6B (Aug.),
71 and Computer Directory and of Ba Toi," American Friends 21/6 (June), 50; 21/7 (July), Government Lies," by Bill Zim- 176
Buyers' Guide Issue, Vol. 19, Service Committee, 21/7 (July), 7 merman, 21/9 (Sept.), 33 "Buyers' Guide to Products and
No. 6B of 'Computers and Auto- 37 "The Old Brain, the New Brain, Bombs, "X-Rays Air Luggage for Services in Computers and Data
mation' ," 21/1 (Jan.), 25 "The Bad Image That Computers the Giant Brain, and Common Bombs at High Speed," 21/5 Processing," 21/6B (Aug.), 63
Anthropology, "The Importance of Are Earning," from Harold W. G. Sense," 21/4 (Apr.), 6 Olay) , 43
Being Human," by W. W. Howells, Gearing and others, 21/4 (Apr.), "The Pursui t of Truth in Input, "Books," by Edmund C. Berkeley:
21/10 (Oct.), 12 29 Output. and Processing," ~1/8 21/10 (Oct.), 34; 21/11 (Nov.), c
"The Antisocial Use of Computers ," Baggage inspection, "X-Rays Air (Aug.), 6 40
by Donn B. Parker, 21/8 (Aug.), Luggage for Bombs at lIigh "The Shooting of Governor George Bookstrap, "'Operation Bookstrap' "The C&A Notebook on Common Sense,"
')')
Speed," 21/5 (May), 43 C. Wallace, Candidate for Is lJelping Johnny To Read," by 21/4 (Apr.), 2
Applications: "Barriers in Ap- Banking, "Computers in Banking," President," 21/7 (July), 10 II. J. Peters, 21/1 (Jan.), 49 "The C&A Notebook on Common Sense,
plying Computers," by Edmund by J. Q. Hallam, 21/8 (Aug.), "The Shortage of Good Typists Brai llembos s, "~1. I. T. -Brai llem- 'Common Sense vs. Catastrophe' ,"
C. Berkeley, 21/7 (July), 24 20 -- and the JJ Comm"nd," 21/(, boss Being Used by mind IRS 21/12 (Dec.), 37
"Counting the Number of Appli- "Barriers in Applying Computers," (June),6 Representative," 21/9 (Sept.), "The C&A Notebook on Common Sense,
cations of Computers." by by Edmund C. Berkeley, 21/7 "Some liard Facts, and What To 43 Elementary and Advanced": 21/1
Edmund C. BerKeley, 21/6B (July),24 Do About Them," 21/10 (Oct.), Brain, "The Old Brain, The New (Jan.), 2; 21/2 (Feb.), 3; 21/5
(Aug.), 3 "Baton Houge Moni tors Sewers wi th 3 Brain, The Giant Brain, and Com- (May), 2
"Over 2300 Applications of New Computer System," 21/11 "Statistics -- A Guide to the mon Sense," by Edmund C. Ber- "The C&A Notebook on Common Sense,
Computers and Data Proces- (Nov.), 41 Unknown," 21/10 (OC t. ), 6 keley, 21/4 (Apr.), 6 First Year": 21/8 (Aug.), 37;
sing," by Linda Ladd Lovett, Beauni t Corp., "Color MatChing "ZINGO -- A New Computer Game," "BRAINIAC Homeowner's Protective 21/9 (Sept.), 2; 21/11 (Nov.), 2;
21/6B (Aug.), 137 by Computer Creates a New Busi- 21/:! (Feb.), 32 Kit K40," 21/3 (Mar.), 3 21/12 (Dec.), 2
Appropriations Commi ttee, "Lead ness," by J. Mark Raiteri, 21/ Berkeley, Edmund C., and M. Egan, Brains, mechanical, "Eight Hun- "C&A Notebook on Common Sense:
Poisoning: The Hypocrisy of 1 (Jan.), 50 "Publ ishing Articles on Issues dred People Interested in Me- '!low To Be Silly'," 21/12 (Dec. J,
the Presidency, and of the Ap- Bedside teaching, "University that DOlI't Get the At tent ion chanical Brains," by Edmund C. 49
propriations Committee of the Computer Helps Doctors wi th They Deserve," :!1/1O (Oct.), Berkeley, 21/1 (Jan.), 7 "The C&A Notebook on Common Sense:
House of Representatives," by 'Bedside Teaching' ," 21/11 38 Brandborg, Stewart M., "The Alas- Second Year of Subscription,
William L. Clay, 21/8 (Aug.), (Nov.), 42 Berkeley, Edmund C., and William ka Pipeline Reading Lesson," 197~," "1/12 (Dcc.), 40
7 Bell, Lucy, Mrs., and Mrs. Ruth W. Harper, "Correction and Re- 21/6 (June), 30 "The U,\ Notebook on Common Sense,
Apti tudes, "Pictorial Reasoning Shapin, William II. Wynne, Rai- traction," 21/12 (Dec.), 21 Branfman, Fred, and Steve Cohn, Vulu",,' I," "1/6 (June), 51
Tests and Aptitudes of People ner ~1. Goes, Thomas D. Bryant, Berkeley, Edmund C., and Stanley "The CIA: A Visible Governm('nt

23
Annual Index
C&A notebook: "Common Sense, ces Received from EDP Service Communi ty college, "The Compu ter "Computers and Cartography," by Criminal cases, "District's Su-
Wisdom, and Information Pro- Bureaus," 21/1 (Jan.), 43 and the Community College," by Dennis L. Bress, 21/8 (Aug.), perior Court Uses Computer To
cessing: The Notebook on COIl- "Characteristics of Digital Com- Raymond A. Pietak, 21/1 (Jan.), 25 Keep Track of 100,000 Criminal
mon Sense, Elementary and Ad- puters," by GML Corp., 21/6B 9 "Computers, Ciphers, and Crypto- Cases," Joseph M. Burton, Clerk.
vanced," 21/7 (July), 6 (Aug.), 92 "Computer Artists," 21/8 (Aug.), graphy," by Otis Minot, R.A. 21/2 (Feb,), 52
"Inventory of the Issues of Cheatham, Thomas E., Jr., "Chin- 19 Sobieraj, and K. D. Streetman, Cryptography, "Computers, Ci-
the C&A Notebook on Common ese Computer Science: A Visit Computer Census -- see "Monthly 21/2 (Feb.), 47 phers, and Cryptography," by
Sense, Volume I," 21/5 (May), and a Report," 21/11 (Nov.), 16 Computer Census" "Computers and Communications," Otis Minot, R. A. Sobieraj,
3 "The Checkerboarding Problem," -- see "World Computer Census" by R. C. Scrivener, 21/9 and K. D. Streetman, 21/2
"Questions and Answers About by Tactical Air Command, 21/1 "The Computer and the Communi ty (Sept.), 10 (Feb.), 47
'The C&A Notebook' ," 21/4 (Jan.), 24 College," by Raymond A. Pietak, "Computers at Crisis," by Milton "Cryptology, The Computer, and
(Apr.), 3 Checkless society, "The Cashless, 21/1 (Jan.), 9 R. Wessel, 21/2 (Feb.), 10 Data Privacy," by M. B. Girs-
"Questions and Answers about Checkless Society: On Its Computer Directory and Buyers' "Computers and Dossiers -- Part dansky, 21/4 (Apr.), 12
'The C&A Notebook on Common Way?," by Alan Wetterhuus, 21/ Guide: "Annual Index for Vol- 1," by Vern Countryman, 21/1 ",The Curse of a Magazine," by
Sense, Elementary and Ad- 11 (Nov.), 14 ume 20, 1971 and Computer (Jan.), 13 Edmund C. Berkeley, 21/2
vanced"': 21/1 (Jan.), 3; Chess, "Winner of U.S. Chess Directory and Buyers' Guide "Computers and Dossiers -- Part (Feb.), 6
21/7 (July), 9 Championship," 21/11 (Nov.), 43 Issue, Vol. 19, No. 6B of II," by Vern Countryman, 21/2 Cutler, Robert B., "Spotlight
"CAl (Computer-Aided Instruction) "Chess and Computers," by Edmund 'Computers and Automation'," (Feb.), 14 on McGeorge Bundy and the
Shortens Physician Learning C. Berkeley, 21/9 (Sept.), 6 21/1 (Jan.), 25 '''Computers Enter the Busing White House Situation Room,
Process," 21/12 (Dec.), 43 "Chinese Computer Science More "Free Entries for Your Organi- Controversy' -- Addendum," by November 22, 1963," 21/1 (Jan.),
"CDC vs IBM -- Correction," from Advanced Than Expected," 21/10 zation in the 1973 Computer Robert L. Glass, 21/4 (Apr.), 57
Frederic O. Parlova and Edmund (Oct.), 45 Directory and Buyers' Guide 7
C. Berkeley, 21/4 (Apr.), 32 "Chinese Computer Science: A Issue -- Notice," 21/6B "Computers To Handle Problems on
CIA: "The Activities of the Visit and a Report," by Thomas (Aug.), 176 National Economy, Power Net- o
Central Intelligence Agency, E. Cheatham, Jr., 21/11 (Nov.), "'The Computer Directory and works and Ecology," 21/6 (June),
at Six Billion Dollars a 16 Buyers' Guide' Issue of "Com- 45 "DEC's New School Computer Sys-
Year," by Edward K. DeLong, Ciphers, "Computers, Ciphers, puters and Automation', Not- "Computers and Spelling," by tems," 21/12 (Dec.), 44
21/2 (Feb.), 38 and Cryptography," by Oti s ice": 21/5 (May), 40; 21/6 Edmund C. Berkeley, 21/11 DPMA, "Business Programmer Exam
"The Central Intelligence Ag- Minot, R. A. Sobieraj, and K. (June), 7 (Nov.), 6 Announcements and Study Guides
ency: A Short His tory to D. Streetman, 21/2 (Feb.), 47 "The Computer Directory and "A Concerted Campaign To Deny Now Available," 21/9 (Sept.),
Mid-1963 -- Part I," by James Clay, William L., "Lead Poison- Buyers' Guide Issue 1973 -- the American People Essential 42
Hepburn, 21/11 (Nov.), 32 ing: The Hypocrisy of the Notice," 21/6B (Aug.), 178 Knowledge About the Operation DTSS, Inc., "Dartmouth College
"The Central Intelligence Ag- Presidency, and of the Appro- "Computer Directory and Buyers' of Their Government," by Henry Announces Formation of DTSS,
ency: A Short His tory to priations Committee of the Guide, 1972": 21/7 (July), 50: Steele Commager, 21/4 (Apr.), Inc.," 21/12 (Dec.), 45
Mid-1963 -- Part 2," by James House of Representat i ves," 21/ 21/8 (Aug.), 39; 21/9 (Sept.), 33 "Dallas: Who, How, Why? -- Part
Hepburn, 21/12 (Dec.), 34 8 (Aug.), 7 39; 21/10 (Oct.), 34; 21/11 Conference, "Fall Joint Computer 1," by Mikhail Sagatelyan, 21/
"The CIA: A Visible Government Cleveland-Cliffs Iron Company, (Nov.), 40; 21/12 (Dec.), 51 Conference: Topics," by Edmund 3 (Mar.), 28
in Indochina," by Fred Branf- "Small Computer 'Tracks' Great "Computer Employed in Inner-City C. Berkeley, 21/4 (Apr.), 33 "Dallas: Who, How, Why? Part
man and Steve Cohn, 21/2 (Feb.). Lakes Sailors," 21/9 (Sept.), Heal th Program," 21/8 (Aug.), Confidential data: "3400 Organi- II," by Mikhail Sagatelyan,
41 41 43 zations Required by Court 21/4 (Apr.), 37
"CalComp Plotter Purchased for Coat, "Forty + One Ways To Cut "Computer Helps Analyze World- Order to Furni sh Confiden- "Dallas: Who, How, Why? --
Russian Ministry of Chemical a Coat," by Vectors' Staff, 21/ wide Political Behavior," 21/7 tial Data to IBM," by Leon Part III," by Mikhail Sagatel-
Industry," 21/8 (Aug.), 45 3 (Mar.), 22 (July), 40 Davidson, John D. French, yan, 21/5 (May), 34
Calculator programming, "New Cohn, Steve, and Fred Branfman, "Computer Helps Develop Tomorrow's Norman R. Carpenter, and "Dallas: Who, How, Why? -- Part
Algebra Option Promises Break- "The CIA: A Visible Government Telephone System," 21/9 (Sept.), Philip Neville, 21/2 (Feb.), IV: Conclusion," by Mikhail
through in Calculator Program- in Indochina," 21/2 (Feb.), 41 41 21 Sagatelyan, 21/6 (June), 34
ming," 21/8 (Aug.), 44 Colleges, "Roster of College and "Computer Helps Firm Produce Tif- "3400 Organizations Required D' Anna, Anthony J., "A Trans-
Camden, N. J., "Computer Increas- University Computer Facilities," fany-Inspired Lampshades," 21/ by Court Order to Furnish portation Information System,"
ing Criminal Arrests by 10 Per 21/6B (Aug.), 149 8 (Aug.), 42 Confidential Data to IBM -- 21/9 (Sept.), 14
Cent," 21/7 (July), 42 "Color Matching by Computer Crea- "Computer Helps a Tree-Care Com- II," by Richard E. Sprague, Dartmouth College, "Canadi an
"Camera Plus Computer for Traf- tes a New Bus iness," by J. pany Schedule and Plan," 21/6 Norman R. Carpenter, and Colleges and High Schools are
fic Regulation: A New Observ- Mark Raiteri, 21/1 (Jan.), 50 (June), 44 Business Week, 21/3 (Mar.), Members of Dartmouth's Time-
ing System for Multi-Purpose "Columbus Plus Two" (Computer "Computer Increasing Criminal Ar- 19 Sharing Computer Network," 21/
Data Gathering," by Stanley E. Art), by Mike Seaters, 21/8 rests by 10 Per Cent," 21/7 Conservation, "The Alaska Pipe- 7 (July), 43
Wilkes, Jr., 21/9 (Sept.), 7 (Aug.), 15 (July), 42 line Reading Lesson," by Stew- "Dartmouth College Announces For-
"Canadian Colleges and High "Combinatorial Framework of the "The Compu ter and the I nte llec t- art M. Brandborg, 21/6 (June), mation of DTSS, Inc.," 21/12
Schools are Members of Dart- Ordinal 15" (Computer Art), by ual Frontier," by Dr. Richard 30 (Dec.), 45
mouth's Time-Sharing Computer Manfred Mohr, 21/8 (Aug.), 14 W. Hamming, 21/6 (June), 25 Conspiracy, "The Assassination "Data Banks Endangering Personal
Network," 21/7 (July), 43 Commager, Henry Steele, "A Con- "Computer Keeps 'Railroad' Run- of Senator Robert F. Kennedy: Liberty: Report of Debate in
Car maintenance, "Computer Tells certed Campaign To Deny the ning Smoothly," 21/3 (Mar.), Proofs of Conspiracy and of Parliament, London, Engl and,
Car Owners When Maintenance Is American People Essential Know- 40 Two Persons Firing," by Rich- April 21, 1972," 21/6 (June),
Needed," 21/10 (Oct.), 43 ledge About the Operation of "A Computer Laboratory for Ele- ard E. Sprague and William W. 40
Car production, "Pontiac Dealers Their Government," 21/4 (Apr.), mentary Schools," by Dr. Sey- Harper, 21/9 (Sept.), 24 "Data Center Services Offered
Use Computer To Track Car Pro- 33 mour Papert, 21/6 (June), 19 Construction, "Datran Receives Smaller Stores Installing Elec-
duction for Consumers," by Common Sense: "The C&A Notebook "Computer Loaned to Massachusetts Initial Construction Permits," tronic POS Equipment," 21/8
William F. Grimshaw, 21/2 on Common Sense," 21/4 (Apr.), Prisoners," 21/5 (May), 43 21/6 (June), 45 (Aug.),44
(Feb.), 51 2 Computer manufacturer, "How To "The Construction of Living Ro- Data system, "The Meaning of an
Carpenter, Norman R., and Leon "The C&A Notebook on Common Get the Best Out of a Computer bots -- Part 1," by Edmund C. Integrated Data System," by W.
Davidson, John D. French, Phil- Sense, Elementary and Advan- Manufacturer," by David Futcher, Berkeley, 21/8 (Aug.), 27 R. Larson, 21/4 (Apr.), 35
ip Neville, "3400 Organizations ced": 21/1 (Jan.), 2; 21/2 21/2 (Feb.), 8 Consultant, "The Management Con- "Datran Receives Initial Con-
Required by Court Drder to Fur- (Feb.), 3; 21/5 (May), 2 "Computer Music in 1972," by sul tant' s Role in Assessment struction Permits," 21/6 (June),
nish Confidential Data to IBM," "The C&A Notebook on Common Stuart Smith, 21/10 (Oct.), 16 of Data Processing Activities," 45
21/2 (Feb.), 21 Sense, 'Common Sense vs. "Computer Now Rides Up Front in by James K. McKenna, Jr., 21/ Davey Tree Surgery Company, "Com-
Carpenter, Norman R., and Rich- Catastrophe'," 21/12 (Dec.), Police Cruisers," by Chuck 10 (Oct.), 9 puter Helps a Tree-Care Company
ard E. Sprague, Business Week, 37 Gillam, 21/1 (Jan,), 50 Contest -- see "Art Contes t" Schedule and Plan," 21/6 (June),
"3400 Organizations Required "The C&A Notebook on Common "Computer Plays Key Role at Hill- -- sec "Martin Luther King 44
by Court Order to Furnish Con- Sense, First Year": 21/8 sborough Communi ty College," Memorial Prize Contest" Davidson, Leon, and John D, French,
fidential Data to IBM - II," (Aug.), 37; 21/9 (Sept.), 2; 21/8 (Aug.), 43 Contracts -- see "New Contracts" Norman R. Carpenter, Philip
21/3 (Mar,), 19 21/11 (Nov.), 2; 21/12 (Dec.), "Computer Science Is Added to Correction, "CDC vs IBM -- Cor- Neville, "3400 Organizations
Cartography, "Computers and Car- 2 College's Art Curriculum," 21/ rection," from Frederic O. Par- Required by Court Order to Fur-
tography," by Dennis L. Bress, "c&A Notebook on Common Sense: 3 (Mar.), 40 lova and Edmund C. Berkeley, nish Confidential Data to IBM,"
21/8 (Aug.), 25 'How To Be Silly'," 21/12 "Computer System Models," by 21/4 (Apr.), 32 21/2 (Feb.), 21
"The Cashless, Checkless Socie- (Dec.), 49 Sal vatore C. Catania, 21/3 "Corrections": 21/1 (Jan.), 47; Davis, Ruth M., "The U.S. Center
ty: On Its Way?," by Alan "The C&A Notebook on Common (Mar.), 14 21/4 (Apr.), 32; 21/6 (June), for Computer Sciences and Tech-
Wetterhuus, 21/11 (Nov.), 14 Sense: Second Year of Sub- "Computer Tells Car Owners When 49; 21/7 (July), 38 nology," 21/3 (Mar.), 7
"Cashless-Society Project Reports scription, 1972," 21/12 Maintenance Is Needed," 21/10 "Correction and Retraction," by Dayhoff, Judy, "Whiskered Frisby"
Progress in N.Y.," 21/7 (July), (Dec.), 40 (Oct.), 43 William W. Harper and Edmund (Computer Art), 21/8 (Aug.), 13
41 "The C&A Notebook on Common "Computer Thinking," by G. M. R. C. Berkeley, 21/12 (Dec.), 21 "Dealing with Today's Problems,"
Catania, Salvatore C., "Computer Sense, Volume I," 21/6 (June), Graham, 21/3 (Mar.), 17 Correctional institution, "New by John Skowronski, 21/4 (Apr.),
System Models," 21/3 (Mar.), 51 Computer-aided instruction, "CAl Jersey Correctional Institut- 7
14 "Inventory of the Issues of (Computer-Ai ded Ins truc t ion) ion Pioneers Data Processing "The Death of the Democratic Par-
Catastrophe, "The C&A Notebook the C&A Notebook on Common Shortens Physician Learning Education for Inmates," by G. ty Candidate for the Presidency,
on Common Sense, 'Common Sense Sense, Volume I," 21/5 (May), Process," 21/12 (Dec.), 43 Thompson Durand, 21/2 (Feb.), 1972," by Edmund C. Berkeley,
vs. Catastrophe'," 21/12 (Dec.), 3 "Compu ter-As s is ted Analys i sand 52 21/5 (May), 6
37 "The Old Brain, The New Brain, Documentation of Computer Pro- "Counting the Number of Applica- Debate, "Data Banks Endangering
Central Intelligence Agency: The Giant Brain, and Common grams," 21/10 (Oct,), 32 tions of Computers," by Edmund Personal Liberty: Report of
"The Activities of" the Central Sense," by Edmund C. Berke- "Computer-Field Information vs. C. Berkeley, 2l/6B (Aug.), 3 Debate in Parliament, London,
Intelligence Agency, at Six ley, 21/4 (Apr.), 6 Social Rag," by Arthur Martin Countryman, Vern: "Computers and England, April 21, 1972," 21/6
Billion Dollars a Year," by "Questions and Answers about and Edmund C. Berkeley, 21/7 Dossiers -- Part I," 21/1 (June),40
Edward K. DeLong, 21/2 (Feb,), 'The C&A Notebook on Common (July), 36 (Jan.), 13 '''Debugging System' for Computers
38 Sense, Elementary and Advan- "Computerizing A Membership As- "Computers and Dossiers -- Part Patented by Goodyear Tire & Rub-
"The CIA: A Visible Govern- ced''': 21/1 (Jan.), 3; 21/7 sociation," by William R. Pol- II," 21/2 (Feb.), 14 ber," 21/2 (Feb.), 53
ment in Indochina," by Fred (July), 9 lert, 21/4 (Apr.), 21 Court, "District's Superior Court "Deciphering an Unknown Compu ter
Branfman and Steve Cohn, 21/ "Common Sense, Wis dom, General Computer-Link Corp., "Lessons Uses Computer To Keep Track of Program, as Compared with De-
2 (Feb.), 41 Science, and Computers -- 11," Learned from Recent Floods of 100,000 Criminal cases," Joseph ciphering of Ancient Writing,"
"The Central Intelligence Agency: by Edmund C. Berkeley, 21/1 Computer Rooms," 21/11 (Nov.), M. Burton, Clerk, 21/2 (Feb.), by Edmund C. Berkeley, 21/5
A Short History to Mid-1963 -- (Jan.), 11 39 52 (May), 19
Part 1," by James Hepburn, 21/ "Common Sense, Wisdom, and Infor- Computers and Automation, "Mis- Crime: "Computer Increasing Crim- Decisions, "Essential Computer
11 (Nov.), 32 mation Processing: The Note- sing Issues of 'Computers and inal Arrests by 10 Per Cent," Concepts for Top Management: IV,
"The Central Intelligence Agency: book on Common Sense, Elemen- Automation'," from Stanley Jaf- 21/7 (July), 42 Workable, Sound, Data Processing
A Short History 1'0 Mid-1963 -- tary and Advanced," 21/7 (July), fin, and Edmund C. Berkeley, "Do You Want To Stop Crime?," Decisions," by Robert A. Gagnon,
Part 2," by James Hepburn, 21/ 6 21/5 (May), 28 by William p. Wood, III, 21/4 21/1 (Jan.), 8
l2(Dec.),34 Communications, "Computers and "Computers in Banking," by J. Q. (Apr.), 31 Dellums, Ronald V., Representative,
Cerullo, Michael J., "Satisfac- Communicat ions," by R. C. Hollom, 21/8 (Aug.), 20 "Operation Clean Sweep -- A "Wor 1 d Pe ace Tax Fund Ac t --
tion of Companies wi th Servi- Scr i vener, 21/9 (Sept.), 10 City's War on Crime," by James Proposed Legislation," 21/10
P. Alexander, 21/2 (Feb.), 51 (Oct.), 36

24
Annual Index
DeLong, Edward K., "The Activi- Die •.• ," by Bradley Yaeger & P. Shanks, 21/1 (Jan.), 49 to Furnish Confidential Data 21/4 (Apr.), 33
ties of the Central Intelli- Associates, 21/8 (Aug.), 40 "Effective Management of an to IBM," 21/2 (Feb.), 21 "Georgia To Release Cash Flow
gence Agency, at Six Billion Dunker, Kenneth F., and Paul Instrument Pool," by D. R. "French National Railway Imple- System to State and Local
Dollars a Year," 21/2 (Feb.), Shao: "Lak Gou" (Computer Townsend, 21/5 (May), 8 ments Addi tional Computeriz- Governments at No Cost,"
38 Art), 21/8 (Aug.), 16 Egan, M., and Edmund C. Berkeley, ation To Enhance Profitabil- 21/9 (Sept.), 42
Democratic party: "The Death of "Nine Perspective Projections," "Publishing Articles on Issues i ty," 21/9 (Sept.), 40 "The Information Industry and
the Democratic Party Candi- (Computer Art), 21/8 (Aug.), that Don't Get the Attention The Frenchman Who Was To Kill Government Pol icy," by Cl ay
date for the Presidency, 10 They Deserve," 21/10 (Oct.), Kennedy, "Le Francais Qui De- T. Whitehead, 21/4 (Apr.),
1972," by Edmund C. Berkeley, Durand, G. Thompson, "New Jer- 38 vai t Tuer Kennedy (The French- 24
21/5 (May), 6 sey Correctional Institution "Eight Hundred People Interested man Who Was To Kill Kennedy)," "North Vietnam and American
"Wal ter Sheridan -- Democrats' Pioneers Data Processing Edu- in Mechanical Brains," by by Philippe Bernert and Cam- Bombing: Six American Gov-
Investigator? or Republicans' cation for Inmates," 21/2 Edmund C. Berkeley, 21/1 (Jan.), ille Gilles, 21/12 (Dec.), 38 ernment Lies," by Bill Zim-
Countermeasure?," by Richard (Feb.), 52 7 Fuj itsu, Ltd., "Japanese Firm merman, 21/9 (Sept,), 33
E. Sprague, 21/11 (Nov.), 29 "The Dvorak Simplified Keyboard: "Eight Photographs of a Bush: Buys Programmable Film Read- "The Present Role of Govern-
Democrat ic party headquarters: Forty Years of Frustration," Pictorial Reasoning Tests -- er," 21/8 (Aug.), 45 ments in the World Computer
"Bernard L. Barker: Portrait by Robert Parkinson, 21/11 Part 7," by Neil Macdonald, Fulbright, J. William, and Ri- Industry," by C, W. Spangle,
of a Watergate BurgI ar," by (Nov.), 18 21/10 (Oct.), 27 chard M. Nixon, and others, 21/12 (Dec.), 16
Edmund C. Berkeley, 21/11 Elemen tary schools, "A Computer "Poli tical Lies: An Accept- Graham, G. M. R., "Computer
(Nov.), 26 Laboratory for Elementary able Level?," 21/4 (Apr.), 44 Thinking," 21/3 (Mar.), 17
"The June 1972 Raid on Demo- Schools," by Dr. Seymour Pa- Futcher, David, "How To Get the "Gravi ty Effects Studied Under
cratic Party Headquarters," pert, 21/6 (June), 19 Best Out of a Computer Manu- Compu ter-Controlled Experi-
by Richard E. Sprague, 21/8 "EDP Axioms -- A Cri tical Analy- Elias, Dr. Samy E. G., and R. E. facturer," 21/2 (Feb.), 8 ments," 21/7 (July), 40
(Aug.), 33 sis," by W. Leon Sanford, 21/ Ward, Michael Wilson, "Person- Gray, Stephen Barrat, "Building
"The June 1972 Raid on Demo- 5 (May), 12 al Rapid Transit, Computerized, Your Own Computer -- Part II,"
cratic Party Headquarters EDP service bureaus, "Sati sfac- in Morgantown, West Virginia, G 21/1 (Jan.), 20
(The Watergate Inci dent) -- tion of Companies with Servi- Part II: The Computer as the Great Lakes, "Small Computer
Part 2," by Richard E. Spra- ces Received from EDP Service Heart of Personal Rapid Trans- G.E. computer, "Swedish Steel 'Tracks' Great Lakes Sailors,"
gue, 21/10 (Oct.), 18 Bureaus," by Michael J. Ceru- it," 21/6 (June), 13 Producer Linked to G.E. Com- 21/9 (Sept.), 41
"The June 1972 Raid on Demo- llo, 21/1 (Jan.), 43 "Emission-I" (Computer Art), by puter in Cleveland," 21/11 Grimshaw, William F., "Pontiac
cratic Party Headquarters Ecology: "Computers To Handle Sozo Hashimoto, 21/8 (Aug.), (Nov.), 41 Dealers Use Computer To Track
(The Watergate Incident) -- Problems on National Econo- 13 G~L Corp., "Characteristics of Car Production for Consumers,"
Part 3," by Richard E. Spra- my, Power Networks and Ecol- "Encouragemen t for the Pursuit Digi tal Computers," 21/6B 21/2 (Feb.), 51
gue, 21/12 (Dec.), 24 ogy," 21/6 (June), 45 of Truth," from Mrs. Ruth (Aug.), 92 Gun numbers, "Marlin Computerized
"Dental School Explores Computer- "Don't Die, Ducky, Don't Die Shapin, Mrs. Lucy Bell, William Gagnon, Robert A., "Essential System for Checking and Record-
Aided Instruction," 21/7 •.• ," by Bradley Yaeger & H. Wynne, Rainer M. Goes, and Computer Concepts for Top ing Gun Numbers," 21/8 (Aug.),
(July), 43 Associates, 21/8 (Aug.), 40 Thomas D. Bryant, 21/11 (Nov.), Management: IV, Workable, 42
Digital computers, "Charac ter- "Two Wisconsin Rivers Are 38 Sound, Data Processing Decis-
istics of Digi tal Computers," Cleaner -- Officials Credit England, "Computers in Banking," ions," 21/1 (Jan.), 8
by G~L Corp., 21/6B (Aug.), 92 Computer," 21/9 (Sept.), 41 by J. Q. Hallam, 21/8 (Aug.), Games: "ZINGO -- A New Computer H
Digital Equipment Corp., "DEC's Economy, "Computers To Handle 20 Game," by Edmund C. Berke-
New School Computer Sys terns, " Problems on National Economy, "English College's Timesharing ley, 21/2 (Feb.), 32 Hamming, Dr. Richard W., "The
21/12 (Dec.), 44 Power Networks and Ecology," System Has 3000 Users," 21/11 "ZINGO -- A New Game for Com- Computer and the Intellectual
Director, corporate, "On the 21/6 (June), 45 (Nov.), 42 puters and/or People": 21/3 Frontier," 21/6 (June), 25
Legal Side: The Outside Dir- EDITORIAL: "Achieving 'Personal' Environment, "Air-Pollution Game (Mar.), 2; 21/11 (Nov.), 3 "Harbor Surveillance System Fore-
ector," by Milton R. Wessel, Response from a Computer," To Deal with Environmental Gearing, Harold W.' G., and oth- sees Collisions, Surface Traf-
21/4 (Apr.), 7 by Edmund C. Berkeley, 21/3 Problems," by Prof. Mat thew J. ers, "The Bad Image That Com- fic Problems," 21/3 (Mar.), 41
Directory and Buyers' Guide, (Mar.), 6 Reilly, 21/1 (Jan.), 50 puters Are Earning," 21/4 Harlem, NY, "Free Computer Train-
"The Computer Directory and "Chess and Computers," by Ed- Environmental health, "Ohio State (Apr.), 29 ing Center Coming to Harlem,
Buyers' Guide Issue 1973 -- mund C. Berkeley, 21/9 Uni vers i ty Probing Effect of General science, "Common Sense, NY," 21/5 (May), 42
Notice," 21/6B (Aug.), 17B (Sept.), 6 Environmental Changes on Ilody," Wisdom, General Science, and Harper, William W., and Edmund
Discovery, "Statistics -- A "Computers and Spelling," by 21/10 (Oct.), 44 Compu ter s -- II," by Edmund C. Berkeley, "Correction and
Guide to the Unknown," by Ed- Edmund C. Berkeley, 21/11 "Essenti al Computer Concepts for C. Berkeley, 21/1 (Jan.), 11 Retraction," 21/12 (Dec.), 21
mund C. Berkeley, 21/10 (Oct.), (Nov.), 6 Top Management: IV, Workable, "Geographic Roster of Organiza- Harper, William W., and Richard
6 "Counting the Number of Appli- Sound, Data Processing Decis- tions in Computers and Oat a E. Sprague, "The Assassination
Discriminat ion, "The Mas ter Dis- cations of Computers," by Ed- ions," by Robert A. Gagnon, Processing," 21/6B (Aug.), 51 of Senator Robert F. Kennedy:
criminatory Tool," by Douglas mund C. Berkeley, 21/6B 21/1 (Jan.), 8 "Georgia Inaugurates Statewide Proofs of Conspiracy and of Two
Wright, 21/9 (Sept.), 22 (Aug.), 3 Computerized Training Program Persons Firing," 21/9 (Sept.),
District of Columbia: "Dist- "The Curse of a Magazine," by in Vocational Technical Schoo- 24
rict's Superior Court Uses Edmund C. Berkeley, 21/2 ls," 21/8 (Aug.), 44 Harrison, S. R., "Some Responsi-
Computer To Keep Track of (Feb.), 6 "Georgia To Release Cash Flow bility for Our Chaotic Society,"
100,000 Criminal Cases," "The Death of the Democratic Fabric cutting, "Forty + One Sys tern To State and Local Go- 21/4 (Apr.), 34
Joseph M. Burton, Clerk, 21/ Party Candidate for the Ways To Cut a Coat," by Vec- vernments at No Cost," 21/9 Harvard Uni v., "Chine se Computer
2 (Feb.), 52 Presidency, 1972," by Edmund tors' Staff, 21/3 (Mar.), 22 (Sept.), 42 Science More Advanced Than
"Operation Clean Sweep -- A C. Berkeley, 21/5 (May), 6 Fa'C't'S, "Some Hard Facts, and Gerberick, Dahl A., "Oversupply Expected," 21/10 (Oct.), 45
Ci ty' s War on Crime," by "The House Is on Fire," by What To Do About Them," by Ed- of People in the Computer Hashimoto, Sozo, "Emiss ion-I"
Jame s P. Alexander, 21/2 Edmund C. Berkeley: 21/2 mund C. Berkeley, 21/10 (Oct.), Field," 21/12 (Dec.), 23 (Computer Art), 21/8 (Aug.), 13
(Feb.), 51 (Feb.), 37; 21/8 (Aug.), 38 3 Gerstenhaber, Murray, "Under- Hatfield Polytechnic, "English
"District's Superior Court Uses "Hurray for the Univac Divi- "Faculty Loans to Black Colle- graduate Mathematics Training College's Timesharing System
Computer To Keep Track of sion of Sperry Rand," by ges," by E. Nanas, 21/2 (Feb.), in 1984 -- Some Predictions," Has 3000 Users," 21/11 (Nov.),
100,000 Criminal Cases," Jo- Edmund C. Berkeley, 21/1 52 21/11 (Nov.), 11 42
seph M. Burton, Clerk, 21/2 (Jan.), 6 "Fall Joint Computer Conference: Gillam, Chuck, "Computer Now Heal th, "Computer Employed in
(Feb.), 52 "The Old Brain, The New Brain, Topics," by Edmund C. Berkeley, Rides Up Front in Police Crui- Inner-City Heal th Program," 21/
'" Do What I Mean': The Pro- The Giant Brain, and Common 21/4 (Apr.), 33 sers," 21/1 (Jan.), 50 8(Aug.),43
grammer's Assistant," by War- Sense," by Edmund C. Berke- Farewell America: "The Central Gilles, Camille, and Philippe "Health and Education of Migrant
ren Teitelman, 21/4 (Apr.), 8 ley, 21/4 (Apr.), 6 , Intelligence Agency: A Short Bernert, "Le Francais Qui De- Workers Is Being Watched by a
"Do You Want To Stop Crime?," "Post-Maturity in the Computer History to Mid-1963 -- Part vai t Tuer Kennedy (The French- Computer," 21/6 (June), 44
by William P. Wood, III, 21/4 Field," by Edmund C. Berke- 1," by James Hepburn, 21/11 man Who Was To Kill Kennedy)," "Helping Out," 21/7 (July), 42
(Apr.), 31 ley and Montgomery Phister, (Nov.), 32 21/12 (Dec.), 38 Hepburn, James: "The Central
DoctorsAid, "Mini-Based System Jr .. 21/12 (Dec.), 6 "The Central Intelligence Ag- Girsdansky, M. B., "Cryptology, Intelligence Agency: A Short
Takes Low Cost Patient Medi- "The Pur sui t of Truth in In- ency: A Short Hi s tory to The Computer, and Oats Pri- History to Mid-1963 -- Part 1,"
cal History," 21/12 (Dec.), 44 put, Output, and Processing," Mid-1963 -- Part 2," by James vacy," 21/4 (Apr.), 12 21/1 (Nov.), 32
I, Documentation, "Computer-Ass is- by Edmund C. Berkeley, 21/8 Hepburn, 21/12 (Dec.), 34 Glaciers, "Scientists Obtain "The Central Intelligence Agen-
ted ·Analysis and Documentation (Aug.), 6 Film reader, "Japanese Firm Buys First Three-Dimens ional Look cy: A Short History to Mid-
of Computer Programs," 21/10 "The Shooting of Governor Programmable Film Reader," at Glaciers with Help of Com- 1963 -- Part 2," 21/12 (Dec.),
(Oct.), 32 George C. Wallace, Candidate 21/8 (Aug.), 45 puter," 21/3 (Mar.), 39 34

, "Does Telephone Regulation Pro-


tect the User?," by Bernard
Strassburg, 21/12 (Dec.), 11
Domestic discord, "The Promo-
for President," by Edmund C.
Berkeley, 21/7 (July), 10
"The Shortage of Good Typists
-- and the JJ Command," by
Fire, "The House Is on Fire,"
by Edmund C. Berkeley: 21/2
(Feb.), 37; 21/8 (Aug.), 38
Floods, "Lessons Learned from
Gl ass fiber, "Video telephony
Via Glass Fiber," 21/11 (Nov.),
42
Glass, Robert L., '''Computers
"The High Cost of Vendor's Soft-
ware Practices: Why?," by Ray-
mond E. Bache, 21/12 (Dec.), 20
Hillsborough Community College,
tion of Domestic Discord," by Edmund C, 8erkeley, 21/6 Recent Floods of Computer Enter the Busing Controversy' "Computer Plays Key Role at Hil-
Vincent J. Salandria, 21/1 (June),6 Rooms," Computer-Link Corp., -- Addendum," 21/4 (Apr.), 7 lsborough Communi ty College,"
(Jan.), 37 "Statistics -- A Guide to the 21/11 (Nov.), 39 Goes, Rainer M., and Mrs. Ruth 21/8 (Aug.), 43
"Don't Die, Ducky, Don't Die •.• ," Unknown," by Edmund C. Ber- "Flores En Fortranes," (Computer Shapin, Mrs. Lucy Bell, Wil- Hollom, J. Q., "Computers in
by Bradley Yaeger & Associa- keley, 21/10 (Oct.), 6 Art), by Thomas J. Huston, 21/ liam H. Wynne, Thomas D. Bry- Banking," 21/8 (Aug,), 20
tes, 21/8 (Aug.), 40 Education: "A Computer Labora- 8 (Aug.), 18 ant, "Encouragement for the I1oneywell, Inc., "Computer Loaned
Doomsday, "Association for the tory for Elementary Schools," Florida, "Poinciana, New Florida Pursuit of Truth," 21/11 (Nov,), to Massachusetts Prisoners,"
Prevention of Doomsday -- by Dr. Seymour Papert, 21/6 City, Being Planned with Aid 38 21/5 (May), 43
News and Ideas," 21/10 (Oct.), (June),19 of Computer," McDonnell Douglas Goodrich, B. F., "Marriage of "Horizons and Rebellion," by Ed-
36 "Health and Education of Mi- Automation Co., 21/2 (Feb.), Computers Meets Special Data mund C. Berkeley, 21/9 (Sept.),
"Doomsday -- Class A Hazards," grant Workers Is Being Wat- 51 Processing Needs of B. F. 36
from Edmund C. Berkeley, 21/ ched by a Computer," 21/6 "Forty + One Ways To Cut a Coat," Goodrich," by Arthur Wi 11 iams. "The House Is on Fire," by Edmund
11 (Nov.), 38 (June), 44 by Vectors' Staff, 21/3 (Mar.), 21/1 (Jan.), 49 C. Berkeley: 21/2 (Feb.), 37;
Dossiers: "Computers and Dos- "Helping Out," 21/7 (July), 42 22 Goodyear Tire & Rubber, '''Debug- 21/8 (Aug.), 38
siers -- Part I," by Vern "New Jersey Correctional In- "Free Computer Training Center ging System' for Computers House of Representatives, "Lead
Countryman, 21/1 (Jan.), 13 sti tution Pioneers Data Pro- Coming to Harlem, NY," 21/5 Patented by Goodyear Tire & Poisoning: The Hypocrisy of the
"Computers and Dossiers -- cess ing Education for In- (May), 42 Rubber," 21/2 (Feb.), 53 Presidency, and of the Appropri-
Part II," by Vern Country- mates," by G, Thompson Dur- "Free Entries for Your Organiza- Government: "The CIA: A Visi- ations Committee of the House of
man, 21/2 (Feb.), 14 and, 21/2 (Feb.), 52 tion in the 1973 Computer Dir- ble Government in Indochina," Representatives," by William L.
Drew Health Center, "Computer "Education for Data Processing: ectory and Buyers' Guide Iss- by Fred Branfman and Steve Clay, 21/8 (Aug.), 7
Employed in Inner-City Health Yesterday, Today, Tomorrow," ue -- Notice," 21/6B (Aug.), Cohn, 21/2 (Feb.), 41 "How Fiendish Can You Get?," by
Program," 21/8 (Aug.), 43 by Thomas R, Tirney, 21/7 176 "A Concerted Campaign To Deny Helsingen Sanomat, Ian Low, Judy
Dreyer;· J. L." "Secrecy in the (July), 14 French, John D., and Leon David- the American People Essen- Bellin, Bella Abzug, and Edmund
Data Process ing Industry," "Educational Television Trans- son, Norman R. Carpenter, Phil- tial Knowledge About the Op- C. Berkeley, 21/5 (May), 31
21/8 (Aug.), 24 mission System Connects Univer- ip Neville, "3400 Organiza- eration of Their Government," "How Technolouy Is Freeing the
Ducky, "Don't Die, Ducky, Don't sities and Industries," by J. tions Required by Court Order by Henry Steele Commager, Secretory," by Evelyn Berezin,
21/10 (uct.), 15

25
Annual Index
"How To Get the Best Out of a Braillemboss Being Used by Computer-Controlled Experi- Macdonald, Neil: -- see "Ad- Medical History," 21/12 (Dec.),
Computer Manufacturer," by Blind IRS Representative," 21/ ments," 21/7 (July), 40 vanced Numbles" 44
David Futcher, 21/2 (Feb.), 8 9 (Sept.), 43 Keyboard, "The Dvoark Simplified -- see "Monthly Computer Cen- Medicine, Ohio State Univ. Col-
Howells, W. W., "The Importance "Internal Revenue Service: Use Keyboard: Forty Years of Frus- sus": 21/1 (Jan.), 54; 21/2 lege of, "Uni versi ty Computer
of Being Human," 21/10 (Oct.), of Computers," by William II. tration," by Robert Parkinson, (Feb.), 56; 21/3 (Mar.), 46; Helps Doctors with 'Bedside
12 Stewart, Jr., 21/4 (Apr.), 34 21/11 (Nov.), 18 21/4 (Apr.), 48; 21/5 (May), Teaching' ," 21/11 (Nov.), 42
Human, "The Importance of Being "Inventory of the Issues of the King, Martin Luther, "Martin 46; 21/6 (June), 48; 21/7 Membership, "Computerizing A
Human," by W. W. Howells, 21/ (LA Notebook on Common Sense, Luther King Memorial Prize Con- (July), 46; 21/8 (Aug.), 48; Membership Association," by
10 (Oct.), 12 Volume 1," 21/5 (May), 3 test -- Fourth Year," 21/2 21/9 (Sept.), 46; 21/10 William R. Pollert, 21/4
!lumbert, Dr. !lerbert E., "Aca- "Invisible Phonograph Needle in (Feb.), 34 (Oct.), 48; 21/11 (Nov.), 47; (Apr.), 21
demic Computer Practices, and Development by Navy," 21/9 Knowledge, "The Mos t Important 21/12 (Dec.), 48 "Meri t Computer Network Links
Their Deficiencies," 21/5 (May), (Sept.), 43 of All Branches of Knowledge," -- see "Numbles" Michigan's Largest Universi-
16 Issues, controversial, "Publish- by Edmund C. Berkeley: 21/1 "Eight Photographs of a Bush: ties," 21/3 (Mar.), 40
"Hurray for the Univac Division ing Articles on Issues that (Jan.), 36; 21/2 (Feb.), 2; Pictorial Reasoning Tests -- Metropolis, New Mexico, "Mythi-
of Sperry Rand," by Edmund C. Don't Get the Attention They 21/6 (June), 50; 21/7 (July), Part 7," 21/10 (Oct.), 27 cal City Helps Students Learn
Berkeley, 21/1 (Jan.), 6 Deserve," from M. Egan and Ed- 7 "Pictorial Reasoning Tests -- Municipal Affairs," 21/12
Huston, Thomas J.: "Flores En mund C. Berkeley, 21/10 (Oct.), Kunstler, William M., "Only Analysis and Answers," 21/3 (Dec.),43
Fortranes," (Computer Art), 38 People Massed Together Can Al- (Mar.), 24 Meyers, Michael M., "Industrial
21/8 (Aug.), 18 Italy, "Persuasion -- Ital ian ter Systems," 21/9 (Sept.), 28 "Pictorial Reasoning Tests and Robot Will Automatically Sel-
"Sky Lab SVB" (Computer Art), Style," by Peter Tumi ati, 21/6 Kyle, D. F., "Sperry Rand and Aptitudes of People -- III," ect and Match Actions to Chang-
21/8 (Aug.), 12 (June),41 RCA Sign Final Agreement," 21/2 (Feb.), 29 ing Job Requirements," 21/1
21/2 (Feb.), 53 "Pictorial Reasoning Tests -- (Jan.), 50
Part 5," 21/4 (Apr.), 26 Michalitsanos, Andrew G., "Re-
"Pictorial Reasoning Tests -- ducing and Dismantling Science
Part 6," 21/7 (July), 26 and Research Insti tutions, and
IBM: "CDC vs IBM -- Correction," JJ command: "On the JJ Command," "World Computer Census," 21/6B Social Responsibility," 21/4
from Frederic O. Parlova from Tore Rambol and Edmund "Lak Gou" (Computer Art), by (Aug.), 133 (Apr.), 32
and Edmund C. Berkeley, 21/ C. Berkeley, 21/10 (Oct.), 37 Kenneth F. Dunker and Paul Machet, Michael, Associates, Michigan State Univ.: "Merit
4 (Apr.), 32 "The Shortage of Good Typists Shao, 21/8 (Aug.), 16 "Computer Helps Firm Produce Computer Network Links
"3400 Organizations Required -- and the JJ Command," by Lamps, "Tiny Lamps that Glow for Tiffany-Inspired Lampshades," Michigan's Largest Univer- j
by Court Order to Furnish Edmund C. Berkeley, 21/6 100 Years," Western Electric 21/8 (Aug.), 42 sities," 21/3 (Mar.), 40
Confidential Data to IBM,"
by Leon Davidson, John D.
French, Norman R. Carpenter,
(June),6
Jaffin, Stanley, and Edmund C.
Berkeley, "Missing Issues of
Company, Inc., 21/2 (Feb.), 53
Lampshades, "Computer Helps Firm
Produce Tiffany-Inspired Lamp-
Magazine, "The Curse of a Maga-
zine," by Edmund C. Berkeley,
21/2 (Feb.), 6
"Three Dimens ional Maps from
Computer," 21/12 (Dec.), 42
Migrant workers, "Heal th and
t
and Philip Neville, 21/2 'Compuers and Automation', tI shades," 21/8 (Aug.), 42 Management, "Essential Computer Education of Migrant Workers
(Feb.), 21 21/5 (May), 28 Landgrebe, Dr. David, "Aerial Concepts for Top Management: Is Being Watched by a Computer,"
"3400 Organizations Required .. Japanese Firm Buys Programmable Photography and Computers Aid IV, Workable, Sound, Data Pro- 21/6 (June), 44
by Court Order to Furni sh Film Reader," 21/8 (Aug.), 45 the Battle Against Blight and cessing Decisions," by Robert "Mini-Based System Takes Low
Confidential Data to IBM - Jenkins, Gareth, "Who Shot Presi- Pollution," 21/1 (Jan.), 48 A. Gagnon, 21/1 (Jan.), 8 Cost Patient Medical History,"
II," by Richard E. Sprague, dent Kennedy -- or Fac t and Languages, programming, "Ros ter "The Management Consultant's 21/12 (Dec.), 44
Norman R. Carpenter, and Fable in History," 21/2 (Feb.), of Programming Languages 1972," Role in Assessment of Data Minori ty group, "Schol arship
Business Week, 21/3 (Mar.), 43 by Jean E. Sammet, 21/6B (Aug.), Processing Activities," by Program for Minority Group
19 Job requirement s, .. Industr i al 123 James K. McKenna, Jr., 21/10 Students," 21/12 (Dec.), 44
"IBM's Powerful Partner: The Robot Will Automatically Sel- Larson, W. R., "The Meaning of (Oct.), 9 Minot, Otis, and R. A. Sobieraj,
Accounting Principles Board," ect and Match Actions to Chang- an Integrated Data System," "Management Information Systems: K. D. Streetman, "Computers,
from Samson Science Corp., ing Job Requirements," by 21/4 (Apr.), 35 The Trouble With Them," by Ciphers, and Cryptography,"
21/4 (Apr.), 31 Michael M. Meyers, 21/1 (Jan.), Law, "Mississippi's Computerized Colonel T. B. Mancinelli, 21/ 21/2 (Feb.), 47
Ihrcr, Fred C., "Benchmarking SO Statute System," 21/10 (Oct.), 7 (July), 11 "Missing Issues of 'Computers
vs. Simulation," 21/11 (Nov.), Jobs, "Oversupply of People in 43 Mancinelli, Colonel T. B., "Man- and Automation'," from Stanley
8 the Computer Field," by Dahl "Le Francais Cui Devait Tua Ken- agement Information Systems: Jaffin, and Edmund C. Berkeley,
Image, "The Bad Image That Com- A. Gerberick, 21/12 (Dec.), 23 nedy (The Frenchman Who Was To The Trouble With Them," 21/7 21/5 (May), 28
puters Are Earning," from John Hopkins Uni v., "Harbor Kill Kennedy)," by Philippe (July), 11 "Mississippi's Computerized
Harold W. G. Gearing and oth- Surveillance System Foresees Bernert and Camille Gilles, 21/ Maps, "Three Dimensional Maps Statute System," 21/10 (Oct.),
ers, 21/4 (Apr.), 29 Collisions, Surface Traffic 12 (Dec.), 38 from Computer," 21/12 (Dec.), 43
"Image Analysis -- Even for Ab- Problems," 21/3 (Mar.), 41 "Lead Poisoning: The Hypocrisy 42 Missouri-Columbia, Univ. of,
raham Lincoln," 21/3 (Mar.), Johnson, Jim, and Edmund C. Ber- of the Presidency, and of the Mariner, "Real-Time Pictures of "Image Analysis -- Even for
39 keley, "Subscription Errors: Appropriations Commi ttee of Mars by Mariner and by Compu- Abraham Lincoln," 21/3 (Mar.),
"The Impact of the Compu ter on (LA Will Correct," 21/11 (Nov.), the House of Representatives," ter," by Wayne E. Shufelt, 21/ 39
Society -- Some Comments," by 39 by William L. Clay, 21/8 (Aug.), 6 (June'), 7 Mistakes, "Prevent Mistakes Be-
Joseph Weizenbaum, 21/7 (July), Johnson, Lyndon B., "Dallas: 7 Market information system, fore They Happen?": 21/7
18 Who, How, Why? Part II," 21/4 Legal: "On the Legal Side: A "Bunker-Ramo Activates New (July), 8; 21/9 (Sept.), 3;
"The Importance of Being Human," (Apr.), 37 Lien on Computer Tapes?," by Nationwide Market Data Sys tern," 21/10 (Oct.), 2
by W. W. Howells, 21/10 (Oct.), "The June 1972 Raid on Democra- Milton R. Wessel, 21/6 21/10 (Oct.), 45 Mohr, Manfred, "Combinatorial
12 tic Party Headquarters," by (June), 39 "Marlin Computerized System for Framework of the Ordinal 15"
Index, "Annual Index for Volume Richard E. Sprague, 21/8 (Aug.), "On the Legal Side: The Out- Checking and Recording Gun (Computer Art), 21/8 (Aug.), 14
20, 1971 and Computer Direc- 33 side Director," by Mil ton Numbers," 21/8 (Aug.), 42 "Moment of Truth in Vietnam?,"
tory and Buyers' Guide Issue. "The June 1972 Raid on Democra- R. Wessel, 21/4 (Apr.), 7 Marlin Firearms Company, "Marlin from Charles A. Wells, 21/10
Vol. 19, No. 6B of 'Computers tic Party Headquarters (The "Lessons Learned from Recent Computerized System for Check- (Oct.), 39
and Automation' ," 21/1 (Jan.), Watergate Incident) -- Part 2," Floods of Computer Rooms," Com- ing and Recording Gun Numbers," Monkeys, "Gravity Effects Stud-
25 by Richard E. Sprague, 21/10 puter-Link Corp .. 21/11 (Nov.), 21/8 (Aug.), 42 ied Under Computer, Controlled
Indochina, "The CIA: A Visible (Oct.), 18 39 "Marriage of Computers Meets Experiments," 21/7 (July), 40
Government in Indochina," by "The June 1972 Raid on Democra- Liberty, personal, "Data Banks Special Data Processing Needs M.lNTHLY COMPUTER CENSUS: 21/1
Fred Branfman and Steve Cohn, tic Party Headquarters (The Endangering Personal Liberty: of B.F. Goodrich," by Arthur (Jan.), 54; 21/2 (Feb.), 56;
21/2 (Feb.), 41 Watergate Incident) -- Part 3," Report of Debate in Parlia- Williams, 21/1 (Jan.), 49 21/3 (Mar.), 46; 21/4 (Apr.),
"Industrial Robot Will Automat- by Richard E. Sprague, 21/12 ment, London, England, April Mars, "Real-Time Pictures of Mars 48; 21/5 (May), 46; 21/6
ically Select and Match Actions (Dec.),24 21, 1972," 21/6 (June), 40 by Mariner and by Computer," (June), 48; 21/7 (July), 46;
to Changing Job Requirements," "Justice Department Interested Lies: "North Vietnam and Ameri- by Wayne E. Shufelt, 21/6 21/8 (Aug.), 48; 21/9 (Sept.),
by Michael M. Meyers, 21/1 in ADAPSO Hearings," 21/3 can Bombing: Six American (June),7 46; 21/10 (Oct.), 48; 21/11
(Jan.), 50 (Mar.), 41 Governmen t Lie s," by Bi 11 Martin, Arthur, and Edmund C. (Nov.), 47; 21/12 (Dec.), 48
Informatics, Inc., "Toxicology Zimmerman, 21/9 (Sept.), 33 Berkeley, "Computer-Field In- Morgantown, West Virginia: "Per-
Research Data Available Via "Political Lies: An Acceptable formation vs. Social Rag," sonal Rapid Transit, Compu-
On-line Nationwide Network," K Level?," by Richard M. Nixon, 21/7 (July), 36 terized, in Morgantown, West
21/6 (June), 44 J. William Fulbright, and "Martin Luther King Memorial Virginia, Part I: The Plan,"
Information engineer, "The Ne- Kaler, John, and Edmund C. Ber- others, 21/4 (Apr.), 44 Prize Contest -- Fourth Year," by William W. Aston, 21/6
glect of Significant Subjects, keley, "Unhappy Subscriber to "The Reality Behind the Lies 21/2 (Feb.), 34 (June), 11
and the Information Engineer," Satisfied One," 21/7 (July), in South Vietnam," by Dr. "The Master Discriminatory Tool," "Personal Rapid Transit, Com-
by Peter J. Nyikos and Edmund 38 George Wald, 21/12 (Dec.), by Douglas Wright, 21/9 (Sept.), puterized, in Morgantown,
C. Berkeley, 21/7 (July), 30 Kennedy, John F., President: 31 22 West Virginia, Part II: The
"The Information Industry and "Dallas: Who, How, Why? Part Lincoln, Abraham, "Image Analy- Mathematics, "Undergraduate Compu ter as the Heart of Per-
Government Policy," by Clay II," by Mikhail Sagatelyna, sis -- Even for Abraham Lincoln," Mathematics Training in 1984 sonal Rapid Transit," by Dr.
T. Whitehead, 21/4 (Apr.), 24 21/4 (Apr.), 37 21/3 (Mar.), 39 -- Some Predictions," by Dr. Samy E. G. Elias, R. E. Ward,
Information Interchange, "Ameri. "Le Francais Qui Devai t Tuer Lipp, Michael, "Ode in Celebra- Murray Gerstenhaber, 21/11 and Michael Wilson, 21/6
can Standard Code for Infor- Kennedy (The Frenchman Who tion of RFPs," 21/5 (May), 29 (Nov.), 11 (June), 13
mation Interchange, ASCII," 21/ Was To Ki 11 Kennedy)," by Lipscomb, James, "Adversity" Maturity, "Post-Maturity in the "The Most Important of All Bran-
6B (Aug.), 180 Philippe Bernert and Camill .. (Computer Art), 21/8 (Aug.), 9 Computer Field." by Edmund C. ches of Knowledge," by Edmund
Installations -- see "New In- Gilles, 21/12 (Dec.), 38 Litton UHS, "New High-Density Berkeley, and Montgomery Phis- C. Berkeley: 21/1 (Jan.), 36;
stallations" "Who Shot President Kennedy - Warehousing System Announced ter, Jr., 21/12 (Dec.), 6 21/2 (Feb.), 2; 21/6 (June),
Instant Transaction, "Cashless- or Fact and Fable in History," by Litton OIlS," 21/9 (Sept.), McDonnell Douglas Automation 50; 21/7 (July), 7
Society Project Reports Pro- by Gareth Jenkins, 21/2 42 Co., "Poinciana, New Florida "Movement of South Dakota Phea-
gress in N. Y.... 21/7 (July), (Feb.),43 Lovett, Linda Ladd, "Over 2300 City, Being Planned with Aid sants Tracked by Computer," by
41 Kennedy, Senator Robert F., "The Applications of Computers and of Computer," 21/2 (Feb.), 51 Dr. Donald Progulske, 21/1
Insti tutions, "Reducing and Dis- Assassination of Senator Robert Data Processing," 21/6B (Aug.). McKenna, James K., Jr., liThe (Jan.), 48
mantling Science and Research F. Kennedy: Proofs of Conspir- 137 Management Consultant's Role Multiplication, "SHARE and the
Institutions, and Social Re- acy and of Two Persons Firing," Low, Ian, and Helsingen Sanomat, in Assessment of Data Proces- Mul tiply Carry Bug," by Herb
sponsibility," by Andrew G. by Richard E. Sprague and Wil- Judy Bellin, Bella Abzug, Ed- sing Activities," 21/10 (Oct.), Bright, 21/2 (Feb.), 50
Michalitsanos, 21/4 (Apr.), 32 liam W. Harper, 21/9 (Sept.), mund C. Berkeley, "How FiendiSh 9 llunicipal Affairs, "Mythical City
Instrument pool, "Effecti ve Man- 24 Can You Get?," 21/5 (May), 31 "The Meaning of an Integrated Helps Students Learn Municipal
agement of an Instrument Pool." Kentucky, Univ. of: "Architec- Data System," by W. R. Larson, Affairs," 21/12 (Dec.), 43
by D. R. Townsend, 21/5 (May). ture Students Turning to Com- 21/4 (Apr.), 35 llusic, "Computer Music in 1972,"
8 puter To Improve Design, Cre- M Mechanical brains, "Eight Hun- by Stuart Smith, 21/10 (Oct.),
Intellectual Frontier, "The Con,- ativity," 21/5 (May), 42 dred People Interested in Me- 16
puter and the Intellectual "Dental School Explores Compu- "M.I.T.-Braillemboss Being Used chanical Brains," by Edmund C. "Mythical City Helps Students
Frontier," by Dr. Hichard W. ter-Aided Instruction," 21/ by Blind IRS Representative," Berkeley, 21/1 (Jan.), 7 Learn MuniCipal Affairs," 21/
Hamming, 21/6 (June), 25 7 (July), 43 21/9 (Sept.), 43 Medical history, "Mini-Based 12 (Uec.), 43
Internal Revenue Service, "M. 1. T.- "Gravi ty Effects Studied Under System Takes Low Cost Patient

26
Annual Index
N o "Personal Rapid Transit, Compu- "Pontiac Dealers Use Computer Protection, "BHAINIAC Homeown-
terized, in Morgantown, West To lrack Car Production for er's Protective Kit K40," 21/3
Name selection, "On the Legal ~'Ode in Celebration of RFPs," Virginia, Part 11: The Compu- Consumers," by Williom F. (Mar.), 3
Side: Company Name Selection" by Michael Lipp, 21/5 (May), ter as the Heart of Personal Grimshaw, 21/2 (Feb.), 51 "Publishing Articles on Issues
by Milton R. Wessel, 21/5 29 Rapid Tnnsit," by Dr. Samy "Post-Maturi ty in the Computer that Don't Get the Attention
(May), 29 Ohio State Univ. College of Med- E. G. Elias, II. E, Ward, and Field," by Edmund C. Berkeley, They Deserve," from M. Egan
Nanas, E., "Faculty Loans to icine, "University Computer Michael Wilson, 21/6 (June), and r,lontgomery Phister, Jr., and Edmund C. Berkeley, 21/10
Black Colleges," 21/2 (Feb.), Helps Doctors with 'Bedside 13 21/12 (Dec.), 6 (Oct.),38
52 Teaching'," 21/11 (Nov.), 42 Personal response, IIAchieving Power networks I "Computers To "The Pursuit of Truth in Input,
National Association of Manu- "Ohio State University Probing 'Personal' Response from a Handle Problems on National Output, and Process ing," by
facturers, "Computerizing A Effect of Environmental Changes Computer," by Edmund C. Berke- Economy, Power Networks and Edmund C. Berkeley, 21/8 (Aug.),
Membership Association," by On Body," 21/10 Wc t. ), 44 ley, 21/3 (Mar.), 6 Ecology," :.>1/6 (June), 45 6
William R. Pollert, 21/4 Oil Spi lIs: "Researchers Pre- "Persuasion -- Italian Style," "The Present Role of Governments
(Apr.), 21 dict Oil Spill Movements by Peter Tumiati, 21/6 (June), in the World Computer Indus-
National Cash Register Co., "Da- Using Computer Power," 21/5 41 try," by C. W. Spangle, 21/12 Q
ta Center Services Offered (May), 41 Peters, H. J., '''Operation Book- (Dec.), 16
Smaller Stores Installing "Uon't Die, Ducky, Don't Die Strap' Is Helping Johnny To President: "The Death of the "Questions and Answers About
Electronic POS Equipment," ••. ," by Bradley Yaeger & Read," 21/1 (Jan.), 49 Democratic Party Candidate 'The C&A Notebook'," 21/4
21/8 (Aug.), 44 Associates, 21/8 (Aug,), 40 Pheasants, "Movement of South for the Presidendy, 1972," (Apr.), 3
Navigational satell ite, "Navy Oklahoma State Tech College, Dckota Pheasants Tracked by by Edmund C. Berkeley, 21/5 "Questions and Answers about
and Commercial Users Share "Scholarship Program for Min- Computer," by Dr. Donald Pro- Olay) , 6 'The C&A Notebook on Common
Navigational Satellite," 21/ ority Group Students," 21/12 gulske, 21/1 (Jan.), 48 "Lead Poisoning: The lIypocr- Sense, Elementary and Advanc-
12 (Dec.), 45 (Dec.), 44 Phister, ,Iontgomery, Jr" and i sy of the Pres idency, and ed''': 21/1 (Jan.), 2; 21/7
Navy, "Invisible Phonograph "The Old Brain, The New Brain, Edmund C. Berkeley, "Post- of the Appropriations Com- (July), 9
Needle in Development by Navy," The Giant Brain, and Common ,llaturi ty in the Computer Field," mi t tee of the House of Rep-
21/9 (Sept.), 43 Sense," by Edmund C. Berkeley, 21/12 (Dec.), 6 resentatives," by William
"Navy and Commercial Users 21/4 (Apr.), 6 Phonograph needle, "Invisible L. Clay, 21/0 (Aug.), 7 R
Share Navigational Satellite." "On the JJ Command." from TOTf~ Phonograph Needle in Develop- "The Shooting of Governor
21/12 (Dec.), 45 Rambol and Edmund C. Berkeiey, ment by Navy," 21/9 (Sept.), George C. Wallace, Candidate RCA, "Sperry Rand and RCA Sign
"The Neglect of Significant Sub- 21/10 (Oct.), 37 43 for President," by Edmund Final Agreement," by D. F.
jects, and the Information "On the Legal Side: Company Photographs, "Eight Photographs C. Berxeley, 21/7 (July), 10 Kyle, 21/2 (Feb.), 53
Engineer," by Peter J. Nyikos Name Selection," by Milton R. of a Bush: Pictorial Reason- "The Shooting of Presidential RFPs, "Ode in Celebration of
and Edmund C. Berkeley, 21/7 Wessel, 21/5 (May). 29 ing Tests -- Part 7," by Nei 1 Candidate George C. Wallace: RFPs," by Michael Lipp, 21/5
(July),30 "On the Legal Side: A Lien on ,Iacdonald, 21/10 (Oct.), :27 A Systems-Analysis Discus- (May), 29
Neville, Philip, and Leon David- Computer Tapes?," by 'lilton Physician training, "CAl (Compu- sion," by Thomas Stamm and Railroad: "Computer Keeps 'Rail-
son, John D. French, Norman R. Wessel, 21/6 (June), 39 ter-Aided Instruction) Short- Edmund C. lJerkeley, 21/7 road' Running Smoothly," 21/
R. Carpenter, "3400 Organi- "On the Legal Side: The Outside ens Physician Learning Process," (July),32 3 ('Iar.), 40
zations Required by Court Or- Director," by Milton R. Wessel, ~1/12 (Dec.), 43 "Prevent ~listnkes Before They "French National Railway Imple-
der to Furnish Confidential 21/4 (Apr.), 7 Pictorial Heasoning, "Eight Happen?": 21/7 (July), 8; 21/ ments Additional Computeriz-
Data to IBM," 21/2 (Feb.), 21 "Only People Massed Together Can Photognphs of a Bush: Pic- 9 (Sept.), 3; 21/10 (Oct.), 2 ation To Enhance Profi tabil-
"New Algebra Option Promises Alter Systems," by William ,I. torial Reasoning Tests -- Part Prisoners, "Computer Loaned to i ty," 21/9 (Sept.), 40
Breakthrough in Calculator Kunstler, 21/9 (Sept,), 20 7," by Neil ,llacdonald, 21/10 ,Ilassachuset ts Prisoners," 21/5 Raiteri. J. ;Iark, "Color Match-
Programming,." 21/8 (Aug.), 44 "'Operation Bookstrap' Is Help- (Oct.). 27 (,llay), 43 ing by Computer Creates a New
"New Computers for United Air ing Johnny To Read," by II, .J. "Pictorial Reasoning Tes ts -- Privacy, "Cryptology, The Compu- Business," 21/1 (Jan.), 50
Lines," 21/9 (Sept.), 42 Peters, 21/1 (Jan.), 49 Analysis and Answers," by tf'r, and UClt8 Privacy," by ,\1. Rambol, Tore, and Edmund C. Ber-
NEW CONTRACTS: 21/1 (Jan.), 52; "Operation Clean Sweep -- A Neil ,lacdonald, 21/3 Olar.), Il. Girstiansky, 21/,] (Apr.), 12 keley, "On the JJ Command,"
21/2 (Feb.), 54; 21/3 (Mar.), City's War on Crime," by James Probability, "Statistics and 21/10 (Oct.), 37
42; 21/4 (Apr.), 46; 21/5 P. Alexander, 21/2 (Feb.), 51 "Pictorial Reasoning Test -- ProiJability: An Introduction Rapid transit: "Personal Rapid
(May), 44; 21/6 (June), 46; Opportunities Industrialization C&A No, 2," 21/2 (Feb.). 30 'I hrough Exper imen t s," 21/11 Transi t, Computerized, in
21/7 (July), 44; 21/8 (Aug.), Center. "Free Campu ter Trai n- "Pictorial Reasoning Test -- (I'\ov.), 52 Morgantown, West Virginia,
46; 21/9 (Sept.), 44; 21/10 ing Center Coming to Harlem, C&A No.3," 21/2 (Feb,), :11 PROBLE ~I CORNEl! by Wal ter Penney: Part I: The Plan," by Will-
(Oct.), 46; 21/11 (Nov.), 44; NY," 21/5 Olay) , 42 "Pictorial Reasoning Test: C&A 21/1 (Jan.), 59; 21/2 (Feb.), iam W. Aston, 21/6 (June), 11
21/12 (Dec.), 46 Organizations: "Geographic No, 4," 21/3 (Mar,), 26 57; 21/3 Olar.), 49; 21/4 "Personal Rapid Transit, Com-
"New High-Density Warehousing Roster of Organizations in "Pictorial Reasoning Test: C&A (Apr.), 49; 21/5 Olay) , 26; puterized, in Morgantown,
Sys tem Announced by Litton Computers and Data Proces- No.5," 21/3 Olar.), 27 21/6 (June), 49; 21/8 (Aug.), West Virginia, Part II: The
UHS," 21/9 (Sept.), 42 sing," 21/6B (Aug.), 51 "Pictorial Reasoning Test: C&A 50; 21/9 (Sept.), 50; 21/10 Computer as the Heart of Per-
NEW INSTALLATIONS: 21/1 (Jan.), "Roster of Organiz3tions in Nu, 6," :21/4 (Apr.), 27 (Oct.), 28; 21/11 (Nov.), 25; sonal Rapid Transit," by Dr.
53; 21/2 (Feb.), 55; 21/3 Computers and Data Proces- "Pictorial Reasoning Test: C&A 21/12 (Dec.), 23 Samy E. G. Elias, R. E. Ward,
(Mar.), 43; 21/4 (Apr.), 47; sing." 21/6B (Aug.), 4 No.7," 21/7 (July), 27 "Problem 721: A Scheme of Sorts," and Michael Wilson, 21/6
21/5 (May), 45; 21/6 (June), "Over 2300 Applications of Com- "Pictorial Reasoning Tests by Walter Penney, 21/1 (Jan.), (June), 13
47; 21/7 (July), 45; 21/8 puters and Data Processing," Part 5," by Neil Macdonald, 59 Reading, '''Operation Bookstrap'
(Aug.), 47; 21/9 (Sept.), 45; by Linda Ladd Lovett, 21/6B 21/4 (Apr.), 26 "Problem 722," by Wal ter Penney, Is Helping Johnny To Read,"
21/10 (Oct.), 47; 21/11 (Nov.), (Aug.), 137 "Pictorial Reasoning Tests -- 21/2 (Feb.), 57 21/1 (Jan.), 49
45; 21/12 (Dec.), 47 "Oversupply of People in the Part 6," by Neil Macdonald, "Proulem 723: Behind the Eight "The Reali ty Behind the Lies in
"New Jersey Correctional Insti- Computer Field," by Dahl A. 21/7 (July), 26 Ball," by Wal ter Penney, 21/3 South Vietnam." by Dr. George
tution Pioneers Data Process- Gerberick, 21/12 ([Jec.). 23 "Pictorial Reasoning Tests and ("Iar.), 49 Wald, 21/12 (Dec.), 31
ing Education for Inmates," Apti tudes of People -- Ill," "Problem 724: Chafing at the "Real-Time Pictures of Mars by
by G. Thompson Durand, 21/2 by Neil Macdonald, 21/2 (Feb.), Bit," by Walter Penney: 21/ Mariner and by Compuier," by
(Feb.), 52 29 4 (Apr.), 49 Wayne E. Shufelt, 21/6 (June),
New Mexico, Uni v. of, "Computer Pietak, Raymond A., "The Compu- "Problem 725: StUCk-Up Stick- 7
Science Is Added to College's POS equipment, "Data Center Ser- ter and the Communi ty College," Ons," by Walter Penney, 21/5 Rebellion, "Horizons and Rebel-
Art Curriculum," 21/3 (,lar.), vices Offered Smaller Stores 21/1 (Jan.), 9 (May), 26 lion," by Edmund C. Berkeley,
40 Installing Electronic pas Equip- Pipeline, "The Alaska Pipeline "Problem 726: A Popularity 21/9 (Sept.), 36
"Nine Perspective Projections, II ment." 21/8 (Aug.), 44 Reading Lesson," by Stewart ;~. Program," by Walter Penney, "Reducing and Dismantling Scien-
(Computer Art), by Kenneth F. "Pacification: The Story of Ba Ilrandborg, 21/6 (June), 30 21/6 (June), 49 ce and Research Institutions,
Dunker and Paul Shao, 21/8 loi," American Friend:s Service Plot ter, "CalComp Plot ter Pur- "Problem 727: Bi ts Make Hi ts I" and Social Responsibility," by
(Aug.), 10 Committee, 21/7 (July), 37 chased for Russian Ministry of by Wal ter Penney, 21/0 (Aug.), Andrew G. Michalitsanos, 21/4
1984, "Undergraduate Mathematics Papert, Dr. Seymour, "A Computer Chemical Industry," 21/8 (Aug.), 50 (Apr.),32
Training in 1984 -- Some Pre- Laboratory for Elementary <15 "Problem 729: A Square Problem," Reilly. ,Ilatthew J., "Air-Pollut-
dictions," by Dr. Murray Ger- Schools," 21/6 (June), 19 "Poinciana, !';ew Florida City, by Walter Penney, 21/9 (Sept.), ion Game To Deal with Environ-
stenhaber, 21/11 (Nov.), 11 Parker, Donn B" "The Antisocial Being Planned with Aid of Com- 50 mental Problems," 21/1 (Jan.),
Nixon, Richard M., and J. Wil- Use of Computers," :.>1/0 (Aug.), puter," .lcDonnell Douglas Au- "Problem 7210: Bi llet-Doux," by 50
tomation Co., 21/2 (Feb.), 51 Walter Penney, 21/10 (Oct.), Republ icans, "Walter Sheridan --
liam Fulbright, and others,
"Poli tical Lies: An Accept-
""
Parkinson, Robert, "The Dvorak Poisoning, "Lead Poisoning: The 28 Democrats' Investigator? or Re-
able Level?," 21/4 (Apr.), 44 Simplified Keyboard: Forty lIypocrisy of the Presidency, "Problem 7211: ,\Ionte Carlo," publicans' Countermeasure?,"
"North Vietnam and American Years of Frustration," 21/11 and of the Appropriations Com- by Walter Penney, 21/11 (Nov.), by Richard E. Sprague, 21/11
Bombing: Six American Govern- (Nov.), 18 mi t tee of the 1I0use of Repre- 25 (Nov.), 29
ment Lies," by Bill Zimmerman, Parliament, "Data Banks Endan- sentatives," by William L. "Problem 7212: No Losers," by "Researchers Predict Oil Spill
21/9 (Sept.), 33 gering Personal Liberty: Re- Clay, 21/8 (Aug.), 7 Walter Penney, 21/12 (Dec.), Movements Using Computer Power,"
Notre Dame, Univ~ of, "Computer port of Debate in Parliament, Police cruisers, "Computer Now 23 21/5 (May), 41
To Handle Problems on National London, England, April 21, Rides Up Front in Police Crui- Problems, "Deal ing wi th Today' s Riordan, Francis J., "Telephone
Economy, Power Networks and 1972," 21/6 (June), 40 sers," by Chuck Gillam, 21/1 Problems," by John Skowronski, Rate Structures: A Squeeze for
Ecology," 21/6 (June), 45 Parlova, Frederic 0" and Edmund (Jan.),50 21/4 (Apr.), 7 the Average American," 21/12
"No.4 ESS Will Triple Toll Call C. Berkeley, "CDC vs IB~I -- "Political Assassination in the Products, "Buyers' Guide to Pro- (Dec.), 8
Capacity," 21/0 (Aug.), 45 Correction," 21/4 (Apr,), 32 Uni ted States," 21/:; (May), 7 ducts and Services in Computers Robot: "Industrial Robot Will
Numbles -- see "Advanced Numbles" "Peacock Courtship" (Computer Political behavior, "Computer and Data Processing," 21/6B Automatically Select and
NUMBLES: by Neil Macdonald: Art), by Bharat K. Shah, 21/8 Helps Analyze Worldwide Poli- (Aug.),63 Match Actions to Changing
1t721 , 21/1 (Jan.), 45; 1t722 , (Aug,), 1 tical Behavior," 21/7 (July), Profi t, "Sixth Annual Computer Job Requirements," by Mich-
21/2 (Feb.), 29; 11'723, 21/3 Penney, Wal ter -- see "Problem 40 Services Industry Study Shows ael M. ,Ieyers, 21/1 (Jan.),
(Mar.), 45; 1t724, 21/4 (Apr.), Corner" "Political Lies: An Acceptable Profit for 1971," 21/11 (1';0\,.), 50
36; 1t725, 21/5 (May), 49; Pentagon Papers, "A Concerted Leve I?," by Richard M. Nixon, 39 "The Construction of Living
1t726, 21/6 (June), 23; 11'727, Campaign To Deny the American and J, William Fulbright, and Prograrruner's assistant, "'Uo Robots -- Part 1," by Edmund
21/7 (July), 26; 1t728 , 21/8 People Essential Knowledge others, 21/4 (Apr.), 44 What 1 Mean': The Programmer's C. Berkeley, 21/8 (Aug.), 27
(Aug.), 50; 1t729, 21/9 (Sept.), About the Operation of Their Pollert, William R" "Computer- Assistant," by Warren Teitel- "Roster of College and University
13; lt72lO, 21/10 (Oct.), 50; Government," by Henry Steele izing A Membership Associa- man, 21/4 (Apr.), 8 Computer Facili ties," 2l/6B
1t7211, 21/11 (Nov.), 28; 21/ Commager, 21/4 (Apr.), 33 tion," 21/4 (Apr,), 21 Programming Languages. "Ros te r (Aug.), 149
12 (!Jec.) , 30 People, massed together, "Only Pollution: "Aerial Photography of Programming Languages 1972," "Roster of Computer Associations,"
Nyikos, Peter J., and Edmund C. People Massed Together Can and Computers Aid the Battle by Jean E. Sammet, 21/6B (Aug.), 21/6B (Aug.), 160
Berkeley, "The Neglect of Sig- Alter Systems," by William M. A~ainst Blight and Pollution," 123 "Hoster of Computer Users Groups,"
nificant Subjects, and the Kunstler, 21/9 (Sept.), 28 by Dr. David Landgrebe, 21/1 Progulske, Dr. Donald, "Movement 21/(JIJ (Aug.), 177
Information Engineer," 21/7 "Personal Rapid Transit, Compu- (Jan.),48 of South Dakota Pheasants Ho~ t"r, GeO\lraphic, "Geographic
(July), 30 terized, in ,lorgantown, West "Air-Pollution Game To Deal Tracked by Computer," 21/1 Host"r of Oqprdzations in Com-
Virginia, Part 1: The Plan," wi th Environmental Problems," (Jan.), 48 Ilutf'rs :infl Data Processing,"
by William W. Aston, 21/6 by Prof. Matthew J. Reilly, "The Promotion of Domestic Dis- :.!l/I,H (,\UU.), Sl
(June), 11 21/1 (Jan.), 50 cord," by Vincent J. Salandria, "llost,'r of Organizations in Com-
21/1 (Jan.), 37

27
Annual Index
puters and Data Processing," "The Shooting of Governor Geor- "Wal ter Sheridan -- Democrats' "Telephone-Sized Computer, BR- u
2l/6B (Aug.), 4 ge C. Wallace, Candidate for Investigator? or Republ icans' 1018, Moves Into Production,"
"Roster of Programming Langua- President," by Edmund C. Ber- Countermeasure?," 21/11 21/10 (Oct.). 45 "Undergraduate Mathematics Train-
ges 1972," by Jean E. Sammet, keley, 21/7 (July), 10 (Nov.), 29 Televis ion, educational, "Educa- ing in 1984 -- Some Predic-
2l/6B (Aug.), 123 "The Shooting of Presidential Sprague, Richard E., and Norman tional Television Transmission tions," by Dr. Murray Gersten-
Russian Ministry of Chemical Candidate George C. Wallace: R. Carpenter, Business Week, System Connects Universities haber, 21/11 (Nov.), 11
Industry, "CalComp Plotter A Systems-Analysis Discussion," "3400 Organizations Required and Industries," by J. P. "Unhappy Subscriber to Sati s-
Purchased for Russian Minis- by Thomas Stamm and Edmund C. by Court Order to Furnish Con- Shanks, 21/1 (Jan.), 49 fied One," from John Kaler and
try of Chemical Industry," 21/ Berkeley, 21/7 (July), 32 fidential Data to IBM - II," "Tenth Annual Computer Art Con- Edmund C. Berkeley, 21/7
8 (Aug.). 45 Shufeldt Cadillac, Inc., "Compu- 21/3 (Mar.), 19 test": 21/5 (May), 40; 21/6 (July),38
ter Tell s Car Owners When Sprague, Richard E., and William (June), 41; 21/8 (Aug.), 8 Uni ted Air Lines, "New Computers
Maintenance Is Needed," 21/10 W. Harper, "The Assassination Test -- see Pictorial Reasoning for United Air Lines," 21/9
(Oct.), 43 of Senator Robert F. Kennedy: Test (Sept.),42
Sagatelyan, Mikhail: "Dallas: Shufel t, Wayne E •• "Real-Time Proofs of Conspiracy and of "Business Programmer Exam An- "The U.S. Center for Computer
Who, How, Why? -- Part 1," Pictures of Mars by Mariner Two Persons Fir ing," 21/9 nouncements and Study Guides Sciences and Technology," by
21/3 (Mar.), 28 and by Computer," 21/6 (June), (Sept.), 24 Now Available," 21/9 (Sept.), Ruth M. Davis, 21/3 (Mar.), 7
"Dallas: Who, How, Why? Part 7 Stamm, Thomas, and Edmund C. 42 Uni vac computers, "French Na-
II," 21/4 (Apr.), 37 Siemens, Germany, "Videotele- Berkeley, "The Shooting of "Textbook Control SysTem Saves tional Railway Implements Ad-
"Dallas: Who, How, Why? -- phony Via Glass Fiber," 21/11 Presidential Candidate George Dollars for St. Louis Taxpay- ditional Computerization To
Part III," 21/5 (May), 34 (Nov.), 42 C, Wallace: A Systems-Analy- ers," 21/11 (Nov.), 41 Enhance Profitability," 21/9
"Dallas: Who, How, Why? -- Simis, T. L., "Telephone Service: sis Discussion," 21/7 (July), Thinking, "Computer Thinking," (Sept.>, 40
IV: Conclusion," 21/6 (June), The Rules of the Game When the 32 by G. M. R. Graham, 21/3 Univac Div., Sperry Rand, "Hur-
34 Game is Changing," 21/12 "Statistics -- A Guide to the (Mar.), 17 ray for the Univac Division
St. Louis Board of Education, (Dec.), 13 Unknown," by Edmund C. Berkeley, "Three Dimensional Maps from of Sperry Rand," by Edmund C.
"Textbook Control System Saves Simulation, "Benchmarking vs. 21/10 (Oct.), 6 Computer," 21/12 (Dec.), 42 Berkeley, 21/1 (Jan.), 6
Dollars for St. Louis Taxpay- Simulation," by Fred C. Ihrer, "Statistics and Probabili ty: An "3400 Organizations Required by Uni versi ties, "Roster of College
ers," 21/11 (Nov.), 41 21/11 (Nov.), 8 Introduction Through Experi- Court Order to Furnish Confi- and Universi ty Computer Facil-
Salandria, Vincent J., "The Pro- "Sixth Annual Computer Services ments," 21/11 (Nov.), 52 dential Data to IBM," by Leon ities," 21/6B (Aug.), 149
motion of Domestic Discord," Industry Study Shows Profit Statute system, "Mississippi's Davidson, John D. French, Nor- "University Computer Helps Doc-
21/1 (Jan.), 37 for 1971," 21/11 (Nov.), 39 Computer ized Statute Sys tern, to man R. Carpenter, and Philip tors wi th 'Bedside Teaching' ,"
Sammet, Jean E., "Roster of Pro- "60 Second Order Processing at 21/10 (Oct.), 43 Neville, 21/2 (Feb.), 21 21/11 (Nov.), 42
gramming Languages 1972," 21/ Warehouse Distribution Center," Steel producer, "Swedi sh Stee 1 "3400 Organizations Required by "Unsettling, Disturbing, Criti-
6B (Aug.), 123 21/12 (Dec.), 42 Producer Linked to G.E. Com- Court Order to Furnish Confi- cal ... ": 21/4 (Apr.), 34;
Samson Science Corp., "IBM's Skowronski, John, "Dealing wi th puter in Cleveland," 21/11 dential Data t() IBM - II," by 21/5 (May), 28; 21/7 (July),
Powerful Partner: The Account- Today's Problems," 21/4 (Apr.), (Nov.). 41 Richard E. Sprague, Norman R. 35; 21/9 (Sept.), 35; 21/10
ing Principles Board," 21/4 7 Stewart. William H., Jr., "In- Carpenter, and Business Week, (Oct.), 39; 21/11 (Nov.), 31;
(Apr.), 31 "Sky Lab WVB" (Computer Art), ternal Revenue Service: Use 21/3 (Mar.), 19 21/12 (Dec.), 33
Sanford, W. Leon, "EDP Axioms -- by Thomas J. Huston, 21/8 of Computers." 21/4 (Apr.), 34 Tiffany lampshades, "Computer Users Groups, "Roster of Compu-
A Critical Analysis," 21/5 (Aug.), 12 Strassburg, Bernard, "Does Tele- Helps Firm Produce Tiffany- ter Users Groups," 2l/6B
(May), 12 "Small Computer 'Tracks' Great phone Regulation Protect the Inspired Lampshades," 21/8 (Aug.), 177
Sanomat, Helsingen, and Ian Low, Lakes Sailors," 21/9 (Sept.), User?," 21/12 (Dec.), 11 (Aug.), 42 Utilities: "Does Telephone Reg-
Judy Bellin, Bella Abzug, Ed- 41 Streetman, K. D., and Otis Minot, Timesharing system, "English ulation Protect the User?,"
mund C. Berkeley, "How Fiend- Smith, Stuart, "Computer Music R. A. Sobieraj, "Computers, College's Timesharing System by Bernard Strassburg, 21/12
ish Can You Get?," 21/5 (May), in 1972," 21/10 (Oct.), 16 Ciphers, and Cryptography," Has 3000 Users," 21/11 (Nov.), (Dec.), 11
31 Sobieraj, R. A.. and Otis Minot, 21/2 (Feb.), 47 42 "Telephone Rate Structures:
Santa Marie, CA, "Water Meter K. D. Streetman, "Computers, Subjects, significant, "The "Tiny Lamps that Glow for 100 A Squeeze for the Average
Readings Streamlined by Compu- Ciphers, and Cryptography," Neglect of Significant Subjects, Years," Western Electric Com- American," by Francis J.
ter," 21/8 (Aug.), 43 21/2 (Feb.), 47 and the Information Engineer," pany, Inc .. 21/2 (Feb.), 53 Riordan, 21/12 (Dec.), 8
Satellite, "Navy and Commercial Social rag, "Computer-Field by Peter J. Nyikos and Edmund Tirney, Thomas R.. "Education "Telephone Service: The Rules
Users Share Navigational Sat- Information vs, Social Rag," C. Berkeley, 21/7 (July), 30 for Data Processing: Yester- of the Game When the Game Is
ellite," 21/12 (Dec.), 45 by Arthur Martin and Edmund C. Subscriber, "Unhappy Subscriber day, Today, Tomorrow," 21/7 Changing," by T. L. Simis,
"Satisfaction of Companies with Berkeley, 21/7 (July), 36 to Satisfied One," from John (July), 14 21/12 (Dec.), 13
Services Received from EDP Social respons ibili ty, "Reducing Kaler and Edmund C. Berkeley. Toll calls, "No.4 ESS Will
Service Bureaus," by Michael and Dismantling Science and 21/7 (July), 38 Triple Toll Call Capacity,"
J. Cerullo, 21/1 (Jan.), 43 Research Insti tutions, and "Subscription Errors: C&A Will 21/8 (Aug.), 45 v
Schmidt, Steven A., "Who-OO-oo- Social Responsibi Ii ty," by Correct," from Jim Johnson and Townsend, D. R., "Effective Man-
00 Is Watching You," (Computer Andrew G. Michalitsanos, 21/4 Edmund C. Berkeley. 21/11 a\lement of an I nstrument Pool," Vectors' Staff, "Forty + One
Art), 21/8 (Aug.), 19 (Apr.), 32 (Nov.), 39 21/5 (May), B Ways To Cut a Coat," 21/3
"Scholarship Program for Minor- Society: "The Impact of the Com- "Sunfish," (Computer Art), by Toxicology, "TOXICON Service Be- (Mar.), 22
ity Group Students," 21/12 puter on Society -- Some Bharat K. Shah, 21/8 (Au~.), gins Operations," 21/10 (Oct.), "Videotelephony Via Glass Fiber,"
(Dec.), 44 Comments," by Joseph Weizen- "Supertanker Features Computer 44 21/11 (Nov.), 42
School computer systems, "DEC's baum, 21/7 (July), 18 System," 21/5 (May), 42 "Toxicol()gy Research Data Avail- Vietnam, "Moment of Truth in
New School Computer Systems," "Some Responsibility for Our "Swedish Steel Producer Linked able Via On-Line Nationwide Vietnam?," from Charles A.
21/12 (Dec.), 44 Chaotic Society," by S. R. to G.E. Computer in Cleveland," Network," 21/6 (June), 44 Wells, 21/10 (Oct.), 39
"Scientists Obtain First Three- Harrison, 21/4 (Apr.), 34 21/11 (Nov.), 41 "TOXICON Service Begins Opera- Vocational Technical Schools,
Dimensional Look at Glaciers Software practices, "The High Syosset, N. Y., "Cashless-Society tions," 21/10 (Oct.), 44 "Georgia Inaugurates Statewide
with Help of Computer," 21/3 Cost of Vendor's Software Pra- Project Reports Progress in Traffic problems, "Harbor Sur- Computerized Training Program
(Mar.), 39 ctices: Why?," by Raymond N. Y. ," 21/7 (July), 41 veillance System Foresees Col- in Vocational Technical Schools,"
Scrivener, R. C., "Computers E. Boche, 21/12 (Dec.), 20 Systems, social, "Only People lisions, Surface Traffic Prob- 21/8 (Aug.), 44
and Communicat ions," 21/9 "Some Basic Arithmetical Tables," Massed Together Can Alter Sys- lems," 21/3 (Mar.), 41
(Sept.), 10 2l/6B (Aug.), 179 tems," by William M. Kunstler, Traffic regulation, "Camera Plus
Seaters, Mike, "Columbus Plus "Some Hard Fac ts, and What To 21/9 (Sept.), 28 Computer for Traffic Regula- w
Two" (Computer Art), 21/8 Do About Them," by Edmund C. Systems-analysis, "The Shooting tion: A New Observing System
(Aug~), 15 Berkeley, 21/10 (Oct.), 3 of Presidential Candidate for Multi-Purpose Data Gather- Wald, George, "The Reality Behind
"Secrecy in the Data Processing "Some Responsibility for Our George C. Wallace: A Systems- in·g," by Stanley E. Wilkes, Jr., the Lies in South Vietnam," 21/
Industry," by J. L. Dreyer, Chaotic Society." by S. R. Analysis Discussion," by Thomas 21/9 (Sept.), 7 12 (Dec.), 31
21/8 (Aug.), 24 Harrison, 21/4 (Apr.), 34 Stamm and Edmund C. Berkeley, Training, "Georgia Inaugurates Wallace, George C.: "The Shoot-
Secretary, "How Technology Is South Vietnam, "The Real ity Be- 21/7 (July), 32 Statewide Computerized Train- ing of Governor George C.
Freeing the Secretary," by hind the Lies in South Vietnam," ing Program in Vocational Tech- Wallace Candidate for Presi-
Evelyn Berezin, 21/10 (Oct.), by Dr. George Wald, 21/12 nical Schools," 21/8 (Aug.), 44 dent," by Edmund C. Berkeley,
15 (Dec.), 31 T Training center, "Free Computer 21/7 (July). 10
Services, "Buyers' Guide to Pro- Southern California, Univ. of, Training Center Coming to Har- "The Shooting of Presidential
ducts and Services in Compu- "Computer Helps Analyze World- Tactical Air Command, "The Chec- lem, NY," 21/5 (May), 42 Candidate George C. Wallace:
I,
ters and Data Processing," 21/ wide Political Behavior," 21/ kerboarding Problem," 21/1 "A Transportation Information Sys- A Systems-Analysis Discus-
6B (Aug.), 63 7 (July), 40 (Jan.), 24 tem," by Anthony J. D'Anna, sion," by Thomas Stamm and
Sewers, "Baton Rouge Monitors Spangle, C. W., "The Present Tanker, "Supertanker Fe atures 21/9 (Sept.), 14 Edmund C. Berkeley, 21/7
Sewers with New Computer Sys- Role of Governments in the Computer System," 21/5 (May), Tree-care, "Computer Helps a Tree- (July), 32
tem," 21/11 (Nov.), 41 World Computer Industry," 21/ 42 Care Company Schedule and PI an, " "Wal ter Sheridan -- Democrats'
Shah, Bharat K.: "Peacock 12 (Dec.), 16 Tapes, computer, "On the Legal 21/6 (June), 44 Investigator? or Republicans'
Courtship" (Computer Art), Spelling, "Computers and Spel- Side: A Lien ·on Computer Truth: "Encouragement for the Countermeasure?," by Richard
21/8 (Aug.), 1 ling," by Edmund C. Berkeley, Tapes?," by Milton R. Wessel, Pursuit of Truth," from Mrs. E. Sprague, 21/11 (Nov.), 29
"Sunfis h" (Computer Art), 21/ 21/11 (Nov.), 6 21/6 (June), 39 Ruth Shapin, Mrs. Lucy Bell, Wang Laboratories, "New Algebra
8 (Aug.), 8 "Sperry Rand and RCA Sign Final Tax fund act, "World Peace Tax William H. Wynne, Rainer M. Option Promises Breakthrough
Shanks, J. P., "Educational Te- Agreement," by D. F. Kyle, 21/ Fund Act -- Proposed Legisla- Goes, and Thomas D. Bryant, in Calculator Programming,"
levision Transmission System 2 (Feb.), 53 tion," by Representative Ron- 21/11 (Nov.), 38 21/8 (Aug.), 44
Connects Universities and In- Sperry Rand, Univac Division, ald V. Dellums, 21/10 (Oct.), "The Pursuit of Truth in Input, Ward, R. E., and Dr. Samy E. G.
dustries," 21/1 (Jan.), 49 '~Hurray for the Univac Divis- 36 Output, and Processing," by Elias, Michael Wilson, "Per-
Shao, Paul, and Kenneth F. Dun- ion of Sperry Rand," by Edmund Teitelman, Warren, '''Do What I Edmund C. Berkeley, 21/8 sonal Rapid Transit, Computer-
ker: "Lak Gou" (Computer C. Berkeley, 21/1 (Jan.), 6 Mean': The Programmer's As- (Aug.), 6 ized, in Morgantown, West Vir-
Art), 21/8 (Aug.), 16 "Spotlight on McGeorge Bundy and sistant," 21/4 (Apr.), 8 Tumiati, Peter. "Persuasion -- ginia, Part II: The Computer as
"Nine Perspective Projections," the White House Situation le1ephone: "Computer Helps De- Italian Style," 21/6 (June), 41 the Beart of Personal Rapid
(Computer Art), 21/8 (Aug.), Room, November 22, 1963," by velop Tomorrow's Telephone "Two Wisconsin Rivers Are Clean- Transit," 21/6 (June), 13
10 Robert B. Cutler, 21/1 (Jan.), System," 21/9 (Sept.), 41 er -- Officials Credit Compu- Warehouse distribution, "60 Sec-
Shapin, Ruth, Mrs .. and Mrs. 57 "Does Telephone Regulation Pro- ter," 21/9 (Sept.), 41 ond Order Processing at Ware-
Lucy Bell, William H. Wynne, Sprague, Richard E.: "The June test the User?, to by Bernard Typewri ting, "The Dvorak Simpli- house Distribution Center," 21/
Rainer M. Goes, Thomas D. Bry- 1972 Raid on DemocratiC Par- Strassburg, 21/12 (Dec.), 11 fied Keyboard: Forty Years of 12 (Dec.), 42
ant, "Encouragement for the ty Headquarters," 21/8 "Telephone Rate Structures: A Frustration," by Robert Parkin- Warehousing system. "New High-
Pursuit of Truth," 21/11 (Nov.), (Aug.), 33 Squeeze for the Average Ameri- son, 21/11 (Nov.), 18 Densi ty Warehousing System An-
38 "The June 1972 Raid on Demo- can," by Francis J. Riordan, Typists, "The Shortage of Good nounced by Litton UIlS," 21/9
"SHARE and the Mul tiply Carry cratic Party Headquarters 21/12 (Dec.), 8 Typists -- and the JJ Command," (Sept.), 42
Bug," by Herb Bright, 21/2 (The Watergate Incident) -- "Telephone Service: The Rules by Edmund C. Berkeley, 21/6 Warfare, "How Fiendish Can You
(Feb.), 50 Part 2," 21/10 (Oct.), 18 of the Game When the Game is (June), 6 Get?," by Helsingen Sanomat,
Sheridan, Walter, "Wal ter Sheri- "The June 1972 Raid on Demo- Changing," by T. L. Simis, 21/ Ian Low, Judy Bellin. Bella
dan -- Democrats' Investiga- cratic Party Headquarters 12 (Dec.), 13 Abzug. and Edmund C. Berkeley.
tor? or Republicans' Counter- (The Watergate Incident) -- 21/5 (May), 31
measure?," by Richard E. Spra- Part 3," 21/12 (Dec.), 24
gue, 21/11 (Nov.), 29

28
Annual Index
"Water Meter Readings Stream- Wessel, Mil ton R.: "Computers Room, November 22, 1963," 21/ ,\(tlson, Michael, and Dr. Samy E. Wright, Douglas, "The Master
lined by Computer," 21/8 at Crisis," 21/2 (Feb.), 10 1 (Jan.), 57 G. Elias, R. E. Ward, "Per- Discriminatory Tool," 21/9
(Aug.), 43 "On the Legal Side: Company Whitehead, Clay T., "The Infor- sonal Rapid Transit, Compu- (Sept.),22
Watergate incident: "Bernard L. Name Selection," 21/5 (May), mation Industry and Government terized, in Morgantown, West Wynne, William H., and Mrs.
Barker: Portrait of a Wa- 29 Policy," 21/4 (Apr.), 24 Virginia, Part II: The Com- Ruth Shapin, Mrs. Lucy Bell,
tergate Burglar," by Edmund "On the Legal Side: A Lien on "Who Shot President Kennedy -- put.er as the Heart of Person- Rainer M. Goes, Thomas D.
C. Berkeley, 21/11 (Nov.), Computer Tapes?," 21/6 or Fact and Fable in History," a"! 'Rapid Transit," 21/6 Bryant, "Encouragement for the
26 (June), 39 by Gareth Jenkins, 21/2 (Feb.), (June), 13 Pursuit of Truth," 21/11
"The June 1972 Raid on Demo- "On the Legal Side: The Out- 43 "Winner of U.S. Chess Champion- (Nov.), 38
cratic Party Headquarters," side Director," 21/4 (Apr.), "Who-OO-oo-oo Is Watching You" ship," 21/11 (Nov.), 43
21/8 (Aug.), 33 7 (Computer Art), by Steven A. Wisconsin rivers, "Two Wiscon- XYZ
"The June 1972 Raid on Demo- Western Electric Company, Inc.: Schmidt, 21/8 (Aug.), 19 sin Rivers Are Cleaner --
cratic Party Headquarters "Helping Out," 21/7 (July), 42 "Who's Who in Computers and Officials Credit Computer," "X-Rays Air Luggage for Bombs
(The Watergate Incident) -- "Tiny Lamps that Glow for 100 Data Process ing": 21/5 (May), 21/9 (Sept.), 41 at High Speed," 21/5 (May),
Part 2," by Richard E. Spra- Years," 21/2 (Feb.), 53 30; 21/6 (June), 2; 21/7 Wisdom, "Common Sense, Wisdom, 43
gue, 21/10 (Oct.), 18 Wetterhuus, Alan, "The Cashless, (July), 2; 21/8 (Aug.), 2; General Science, and Compu- Yaeger, Bradley, and Associates,
"The June 1972 Raid on Demo- Checkless Society: On Its 21/10 (Oct.), 30; 21/11 (Nov.), ters -- II," by Edmund C. "Don't Die, Ducky, Don't Die
cratic Party Headquarters Way?," 21/11 (Nov.), 14 37; 21/12 (Dec.), 41 Berkeley, 21/1 (Jan.), 11 ...... 21/8 (Aug.), 40
(The Watergate Incident) -- "What Have Computers Done for Wilkes, Stanley E., Jr., "Cam- Wood, William P., III, "Do You Zimmerman, Bil~, "North Vietnam
Part 3," by Richard E. Us Lately?," by Congressman era Plus Computer for Traffic Want To Stop Crime?," 21/4 and American Bombing: Six
Sprague, 21/12 (Dec.), 24 Jack 8rooks, 21/10 (Oct.), 7 Regulation: A New Observing (Apr.), 31 American Government Lies,"
Weizenbaum, Joseph, "The Impact "Whiskered Frisby" (Computer System for Multi-Purpose Data "World Computer Census," by 21/9 (Sept.), 33
of the Computer on Society -- Art), by Judy Dayhoff, 21/8 Gathering," 21/9 (Sept.), 7 Neil Macdonald, 2l/6B (Aug.), "ZINGO -- A New Computer Game,"
Some Comments," 21/7 (July), (Aug.), 13 Williams, Arthur, "Marriage of 133 by Edmund C. Berkeley, 21/2
18 Whi te House Si tuation Room, Computers Meets Special Data "World Peace Tax Fund Act -- (Feb.), 32
Wells, Charles A., "Moment of "Spotlight on McGeorge Bundy Process ing Needs of B. F. Good- Proposed Legislation," by "ZINGO -- A New Game for Compu-
Truth in Vietnam?," 21/10 and the White House Situation rich," 21/1 (Jan.), 49 Representative Ronald V. Del- ters and/or People": 21/3
(Oct.), 39 lums, 21/10 (Oct.), 36 (Mar.), 2; 21/11 (Nov.), 3

Political Assassination in the United States


A Few of the Articles Published in Computers and Automation 1970 - 1971
Titles, Authors, and Summaries

May 1970 James Earl Ray says he was coerced into


30 THE ASSASSINATION OF PRESIDENT JOHN F. KENNEDY: entering a plea of guilty to killing Martin
THE APPLICATION OF COMPUTERS TO THE PHOTOGRAPHIC Luther King •.• and contrary evidence (plus
EVIDENCE other evidence) have led to filing of legal
by Richard E. Sprague petitions for "post-conviction relief".
A reexamination of some of the evidence re-
lating to the assassination of John F. Kennedy July 1971
-- with emphasis on the possibilities and 51 THE CENTRAL INTELLIGENCE AGENCY AND THE NEW
problems of computerized analysis of the YORK TIMES
photographic evidence. by Samuel F. Thurston, President, Responsive
Information Systems, Newton, Mass.
August 1970 The issue of systematic suppression of
48 THE ASSASSINATION OF SENATOR ROBERT F. KENNEDY: questions about the assassination of Presi-
48 Preface, by Edmund C. Berkeley dent John F. Kennedy, and a hypothesis.
50 Two Men With Guns Drawn at Senator Kennedy's
Assassination: Statement to the Press, by August 1971
Theodore Charach 37 JIM GARRISON, DISTRICT ATTORNEY, ORLEANS PARISH,
50 Map of the Scene of the Assassination of VS. THE FEDERAL GOVERNMENT
Senator Robert Kennedy by Bernard Fensterwald, Attorney, Executive
51 The Pantry Where Senator Robert Kennedy Was Director, National Committee to Investigate
Assassinated Assassinations
52 Bullet Holes in the Center Divider of the How District Attorney Jim Garrison of New
Pantry Door Orleans became interested in the New Orleans
phase of the assassination of President Ken-
September 1970 nedy; and how the Federal government frus-
39 PATTERNS OF POLITICAL ASSASSINATION: How Many trated and blocked his investigation in more
Coincidences Make a Plot? than a dozen ways.
by Edmund C. Berkeley, Editor, "Computers and
Automation" September 1971
How the science of probability and statistics 26 THE FEDERAL BUREAU OF INVESTIGATION AND THE
, can be used as an instrument of decision
to determine if a rare event is: 0) within
ASSASSINATION OF PRESIDENT KENNEDY
by Bernard Fensterwald, Attorney
a reasonable range; (2) unusual or strange How J. Edgar Hoover and the FBI withheld
or suspicious; or (3) the result of correla- much pertinent information from the Warren
tion or cause or conspiracy. Commission, flooded them with irrelevant in-
formation, and altered some important evi-
October 1970 dence, thus concealing Oswald's connections
52 THE CONSPIRACY TO ASSASSINATE SENATOR ROBERT F. with the FBI.
KENNEDY AND THE SECOND CONSPIRACY TO COVER IT UP
by Richard E. Sprague October 1971
A summary of what researchers are uncovering 41 THE ASSASSINATION OF PRESIDENT KENNEDY -- DE-
in their investigation of what appears to be CLASSIFICATION OF RELEVANT DOCUMENTS FROM THE
not one but two conspiracies relating to the NATIONAL ARCHIVES
assassination of Senator Robert F. Kennedy. by Richard E. Sprague
The titles of the documents and other evi-
December 1970 dence indicate convincingly that Lee Harvey
39 THE ASSASSINATION OF REVEREND MARTIN LUTHER Oswald was trained in spy work by the CIA
KING, JR., THE ROLE OF JAMES EARL RAY, AND THE before his visit to Russia; etc. Like the
QUESTION OF CONSPIRACY Pentagon Papers, these documents should be
by Richard E. Sprague declassified.

29
COMPUTER DIRECTORY AND
BUYERS' GUIDE, 1972
18th ANNUAL EDITION

... a special 13th issue of


Computers and Automation is off
the press and being mailed. Computers and Data Processing:
The COMPUTER DIRECTORY is:
Organizations and Products
Roster of Organizations in Computers and 4
• an annual comprehensive di-
Data Processing
rectory of the firms which of-
fer products and services to Buyers' Guide to Products and Services in Computers 63
the electronic computing and and Data Processing
data processing industry Geographic Roster of Organizations in Computers and 51
Data Processing
• the basic buyers' guide to the
products and services available Roster of College and University Computer Facilities 149
for designing, building, and Roster of Computer Associations 168
using electronic computing
Roster of Computer Users Groups 177
and data processing systems

CONTENTS: See at right -~.~


. The Computer Industry
PRICE: Characteristics of Digital Computers 92
by GML Corp., Lexington, Mass.
• Price for subscribers to Over 2300 Applications of Computers and Data 137
Computers and Automation Processing
whose present subscription
by Linda Ladd Lovett
does not include the Direc-
tory (magazine address label Counting the Number of ~pplications of Computers 3
is marked *N) ..... $12.00 by Edmund C. Berkeley
World Computer Census 133
• Price for non-subscribers
by Neil Macdonald
..... $17.50
The Computer Directory and Buyers' Guide, 176
NOTE: 1973 - Notice

The Directory is included in Entry Forms for the 1973 Computer Directory and 178
the $18.50 full annual sub- Buyers' Guide - Notice
scription (13 issues) to
Computers and Automation Computer Programming
(magazine address label is
marked *0) Roster of Programming Languages, 1972 123
by Jean E. Sammet, IBM Corp., Cambridge, Mass.
Send prepaid orders to:
Computers, Mathematics, and Computer Codes
cornI?nHE!!!:i! Some Basic Arithmetical Tables 179
815 Washington St. American Standard Code for Information 180
Newtonville, Mass. 02160 Interchange (ASCII)

If not satisfactory, the Directory


is returnable in seven days for
full refund.

30 COMPUTERS and AUTOMA nON for January. 1973


EIGHT PHOTOGRAPHS OF A BUSH: ANSWERS-
Pictorial Reasoning Tests -Part 8

Neil Macdonald
Assistant Editor, Computers and Automation

Chronological Sequence. Question 2: What is the


"There undoubtedly is a place for non-verbal, non- correct sequence of the pictures? Answer:
mathematical testing which is not culture-limited, F HE BGCDA
not occupation-limited, and not background-limited
... and which would enable finding and employing Reasons: (1) The buds and the flowers provide the
many useful people -- including programmers -- who key to the first four pictures. In F, the buds com-
do not have American, middle-class backgrounds." pared with the leaves are smallest. In H, the buds
are larger, but there are still no flowers. In E,
The pictorial reasoning tests which we have been there is an open flower. In B, there are more open
publishing since October 1971 require: observation. flowers, but many petals have fallen off. In G, D,
perception, comparison, recognition of shapes and C, and A, there are no buds and no flowers, and so
designs, and reasoning. These operations are dif- we have to look further for more evidence.
ficult for a computer program (except for. the rea-
soning), yet stimulating to a human being. The (2) The sepals (bud coverings) provide some of
techniques needed are those which we as human beings the key for the last four pictures. They are curved
have had to use (and improve) all our lives. out and backwards in pictures G, D, and C; and they
have all fallen off in picture A, which is therefore
New Style of Test the last.
In the October issue we published a sample of a
(3) The tallest and most prominent flower stalk
new style of test, Style 6. It consisted of eight
photographs of the same bush taken from time to showing in pictures F, H, and E, about 3 inches in
from the left edge, is missing in. all later pic-
time during 1972. The photographs were printed in
tures. Evidently some one cut it off. The stalk
a random sequence, and the test consisted of a num- by itself shows in pictures Band G. In D, the
ber of questions about the photographs. The photo- stalk has put out a shoot, with pale leaves, ~bout
graphs were published on successive odd-numbered 2 or 3 inches long, showing in front of the pIpe and
pages of the October issue of "Computers and Auto- partially crossing it. In C, the shoot is twice as
mation" so that a reader might cut the eight pic- big, about 5 inches long (entirely crossing the
tures out of the magazine, place them side by side, pipe), still with pale leaves; and in A the leaves
and compare them.
of the shoot are like the rest of the bush, all of
Here we give the answers to the test, with some the same degree of darkness; and the shoot is no
explanation of the observations and the reasoning longer clearly distinct.
needed. To understand fully these answers, please
refer to the October issue of "Computers and Auto- Time of Day and Compass Direction. Questions 3
mati on", to the eight pictures (labeled A to H) and 4: About what time of day were the pictures
printed on pages 29, 31, 33, and 35. Except for taken? and what was the approximate compass direc-
the pictures, the following discussion is largely tion of the sun?
self-contained and is independent of what was
printed in the October issue. Answer: The question implies that all the pic-
tures-were taken at about the same time of day. In-
spection of the eight pictures shows that this is
reasonable. Picture H shows brightly contrasting
The introduction to the text contained important light and shadow; at the bottom, about 3 inches in
information for answering the set of questions: from the left edge, the shadow of a stem falls
across the middle of a leaf to the left; therefore,
Across from our office which is on the north the sun is at the right. To the right of south is
side of Washington St. in Newtonville, Mass. is west (in the Northern Hemisphere). Therefore, the
a strong wire link fence. This fence separates sun is in the west, and the time of day is the later
Washington St. from a steep embankment descend- part of the afternoon.
ing to lower ground, occupied by a railroad and
a turnpike. At one place on the steep bank be- Weather. Question 5: For each picture, was the
hind the fence grows a vigorous bush which weather sunny and bright? or hazy and dull?
pushes its branches against and through the
wire fence. The distance between the left end Answer: D, G, and H show sharp contrasts between
and the right end of one link in the wire fence leaves in sun and leaves in shadow; therefore, in
has been measured at 3~ inches. those pictures, the weather was sunny and bright.
For the other five pictures, A, B, C, E, F, the
This information implies that (1) the photographs weather was hazy and dull, with no sharp shadows.
were all taken in the same direction, south, and
also (2) gives a scale for measuring what is in Distance. Questions 6 and 7: What pictures were
any picture. taken closest and furthest?

Bush. Question 1: What kind of bush is pictured? Answer: It is reasonable to assume that all the
Answer: A rose bush. The five petaled flower: show- pictures were taken with the same kind of camera,
ing in picture B (two inches in from the left edge, lens, and film. (This was in fact true.) By meas-
and one inch above the pipe) is typically the flower uring the size of the fence links, or by counting
of..Jl rose. the number of links shown in each picture, we can

COMPUTERS and AUTOMATION for January, 1973 31


deduce that D was taken closest to the bush and E
was taken furthest away. NUMBLES
Duration. Question 8: What was the approximate
period of time from the earliest picture to the
latest picture? Neil Macdonald
Assistant Editor
Answer: About two months (or nine or ten weeks). Computers and Automation

Time Intervals between Pictures. Question 9: A "numble" is an arithmetical problem in which: digits
What was the approximate interval of time between have been replaced by capital letters; and there are two
one picture and the next one? Were all the inter- messages, one which can be read right away and a second
vals about the same? one in the digit cipher. The problem is to solve for the
Answer: The first seven pictures are about a digits.
week apart. The last picture is about three or Each capital letter in the arithmetical problem stands for
four weeks after the next to the last. just one digit 0 to 9. A digit may be represented by more
than one letter. The second message, which is expressed in
Calendar Date. Question 10: Approximately what
calendar date or calendar week was each picture numerical digits, is to be translated (using the same key)
taken? into letters so that it may be read; but the spelling uses
puns or is otherwise irregular, to discourage cryptanalytic
This question can probably be answered well only methods of deciphering.
by someone who actually has uncommon knowledge about We invite our readers to send us solutions, together with
roses, and who can adjust his knowledge to the sea-
sons in the Boston area. Under these condi tions, the human programs or computer programs which will produce
following answer is deducible from the pictures. the solutions. This month's Numble was contributed by:
Answer: First picture, end of June / Next four pic-
tures, weekly in July / Next two pictures, first Andrew M. Langer
week and second week in August / Last picture, first Newton High School
or second week in September. -- The actual dates of
the pictures (this of course is not deducible from Newton, Mass.
the pictures) are: F, June 29; H, July 7; E, July
12; B, July 20; G, July 26; D, Aug. 4; C, Aug. 10;
A, Sept. 8 (1972).
NUMBLE 731
History. Question 11: What were some ten major
events that happened to the bush during the period F 0 R E P=E
of the series of pictures?
x 5 1 G HT F=R
Answer: Buds opened into flowers / Flowers
bloomed / Flower petals fell off / Sepals (the bud G F E R
coverings) opened / Sepals bent back / Sepals fell
off / Rose haws formed / Rose haws became quite oGLG0
large / Two major flower stalks were picked / The P N E N G
stub of one of the flower stalks put forth a shoot
/ The shoot grew vigorously / The pale green leaves H E 5 H N
of the ihoot changed to normally dark green leaves.
/ Apparently, between the last two pictures, some- G L N L H
thing happened to the top of the shoot, for its top
does not show in the last picture; one thing that GH5 E NT P 5 1 83270 81294 715
might have happened is that it withered as a result
of late summer drought. Solution to Numble 7212
In Numble 7212 in the December issue, the digits 0
I showed this test to a friend of mine who through 9 are represented by letters as follows:
teaches botany: she said "This would be an exce::'lent
test for students in botany and biology classes".
Whether it is as good a test for persons who have
~nly casual acquaintance with plants is open to
G=O 5=5
question. But there is little doubt in my mind R= 1 C=6
that Sherlock Holmes, Arthur Conan Doylets famous
detective character, would have done extremely well N=2 1=7
on this test -- for he made it his business to be
as observant as possible of details that related to L=3 0=8
deducing conclusions about what had happened in re-
lation to crimes or potential crimes. F, E = 4 A=9
Perhaps some readers of "Computers and Automa- The message is: Life is a dancing girl.
tion" would like to send us a set of 8 related
photographs (6 is rather few, 10 is rather many) of
a subject, with searching questions in observation Our thanks to the following individuals for submitting
and reasoning; we would be much interested in pub- their solutions - to Numble 7211: Harold Schofield,
lishing additional pictorial reasoning tests of this Davenport, Ia.; Jack Smock, Palo Alto, Calif. - to Numble
nature.
7210: E. A. Finn, Tucson, Ariz. - to Numble 729:
Also, does any reader have a computer program T. M. Kaegi, CH-9500 Wil, Switzerland; M. H. Davies,
which might attain a good score on this test? [] Bath, England.

32 COMPUTERS and AUTOMATION for January. 1973


President Richard M. Nixon, the Bay of Pigs, and
the Watergate Incident

Richard E. Sprague
Hartsdale, N. Y. 10530

"The similarities between the actions of E. Howard Hunt, Jr., James McCord,
Bernard Barker, Frank Sturgis, and others in 1960 planning for the Bay of Pigs
and in 1972 planning for re-election of Richard M. Nixon are very striking."

Introduction For more information and background, see the


prior articles on this subject, published in
This article is another installment of a contin- "Computers and Automation", August, October, and
uing report on the Watergate Incident, and its rami- December, 1972.
fications. The incident consisted of the breaking
in of the offices of the National Committee of the Questions to President Nixon
Democratic Party, on the 6th floor of the Watergate The Watergate Incident raised questions during
Office Building, Washington, D.C., and resulting ar- the election campaign about the relationships be-
rests. The forced entry took place around 2:30 a.m., tween President Richard M. Nixon and the Watergate
Saturday, June 17; five men were arrested by Wash- invasion team. The President denied any knowledge
ington police. They had with them extensive photo- of the Watergate affair and issued statements saying
graphic equipment and electronic surveillance de- that no one in the White House was connected with
vices, and wore rubber surgical gloves. The five the operation. To test the reliability of Mr.
men arrested were: Nixon's official statements it is necessary to go
back to the campaign of 1960 and the Bay of Pigs.
-James W. McCord; a Lt. Colonel in the U.S.
Air Force Reserve; 19 years service with The Bay of Pigs Invasion
the CIA; head of a security agency; on Many citizens of America have forgotten that
the payroll of the Committee to Re-elect Richard Nixon in 1959 and 1960 was Vice President
the President as late as May 31, 1972; an of the United States. As an old anti-communist
organizer of the CIA for the Bay of Pigs from Alger Hiss and Khrushchev debate days, Nixon was
invasion of Cuba in 1961. in the forefront of pressure for the Bay of Pigs
invasion of Cuba. What has not been remembered
-Bernard L. Barker; a Cuban-born Miami business is that Nixon was largely responsible for the covert
man; long associated with the CIA; he es- training of Cuban exiles by the CIA in preparation
tablished secret Guatemalan and Nicaraguan for the Bay of Pigs. He so stated in his book
invasion bases. "Six Crises".
-Frank Fiorini (alias Frank Sturgis) Nixon's Lies October 1960

-Eugenio R. Martinez Mr. Nixon's truth-telling capacity during an


election campaign is nowhere more clearly demon-
-Virgilio R. Gonzalez strated than by the deliberate lies he told on
national TV on October 21, 1960. He said in his
These men were closely connected with: book that the lies were told for a patriotic reason,
namely to protect the covert operations planned for
the Republican Party, the Bay of Pigs at all costs. The significance of
the White House, this is that Mr. Nixon considers patriotism as
President Richard M. Nixon, covering the protection of plans or the actions of
the Central Intelligence Agency, and individuals that he considers are working for the
the Committee for Re-Election of the President. United States' best interests.

COMPUTERS and AUTOMATION for January. 1973 33


The similarities between the actions of.Everette Kennedy-Nixon Debates, 1960
Howard Hunt, Jr., James McCord, Bernard Barker,
Frank Sturgis, and others in 1960 planning for the John Kennedy and Richard Nixon engaged in a ser-
Bay of Pigs and in 1972 planning for the re-election ies of national TV debates during the 1960 campaign.
of Richard M. Nixon are very striking. In both Kennedy was briefed by Allen Dulles, head of the CIA
cases, what the plotters themselves considered to at Eisenhower's request, on secret CIA activities and
be patriotic, anti-Communist actions, were involved. international problems, on July 23, 1960. Nixon was
In 1960 the actions were directed against Fidel not aware of the briefing contents and was not sure
Castro, a man they hated as a Communist. In 1972 whether Dulles told Kennedy about the Bay of Pigs
the actions were directed against Edward Kennedy, plans. As it turned out Dulles had not mentioned the
Edmund Muskie, and finally George McGovern. Bernard plans but had kept his remarks rather general about
Barke~ stated the group's collective belief when Cuba.
he said after his arrest that, "We believe that an
election of McGovern would be the beginning of a On October 6, 1960, Kennedy gave his major speech
trend that would lead to socialism and communism on Cuba. He said that events might create an oppor-
or whatever you want to call it." ' tunity for the U.S. to bring influence on behalf of
the cause of freedom in Cuba. He called for encour-
Nixon admitted lying to the American people to
protect Hunt, Barker, Sturgis, and McCord in 1960. aging those liberty-loving Cubans who were leading the
resistance to Castro.
The likelihood that he lied to protect them again in
1972 seems to be quite good. The likelihood that he
Nixon became very disturbed about this because he
actually hired the same old crew he trusted from the
felt Kennedy was trying to pre-empt a policy which he
Bay of Pigs days for the 1972 Watergate and other
espionage activities, also seems to be rather good. claimed as his own. Nixon ordered Fred Seaton, Sec-
retary of the Interior, to call the' White House and
Here are the facts. find out whether Dulles had briefed Kennedy on the
Cuban invasion plans. Seaton talked to General
Andrew Goodpaster, Eisenhower's link to the CIA, who
Nixon's Statements in "Six Crises"
told Seaton that Kennedy did know about the Bay of
Richard Nixon stated in "Six Crises,,:l "The co- Pigs plans.
vert training of Cuban exiles by the CIA was due in Attack on Kennedy by Lying
substantial part, at least, to my efforts. This had
been adopted as a policy as a result of my direct Nixon became incensed. He said, "There was only
support." "President Eisenhower had order the CIA one thing I could do. The covert operation had to
to arm and train the exiles in May of 1960. Nixon be protected at all costs. I must not even suggest
and his advisors wanted the CIA invasion to take by implication that the U.S. was rendering aid to
place before the voters went to the polls on Novem- rebel forces in and out of Cuba. In fac t, I mus t go
ber 8, 1960."2 to the other extreme: I must attack the Kennedy
proposal to provide such aid as wrong and irrespon-
While the Bay of Pigs operation was under the sible because it would violate our treaty commit-
ments. ,,9
overall CIA direction of Allen Dulles, Richard M.
Bissell, Jr. was the CIA man in charge, according
to Ross & Wise. 3 Charles Cabell,4 the deputy direc- So Richard M. Nixon, then our Vice President, now
tor of the CIA, and a man with the code name Frank our President, actually went on national TV (ABC) on
Bender, were also near the top of the operational October 21, 1960, knowing we were going to invade
planning. 5 Cuba, and lied like a "patriotic" trouper. He said
during the fourth TV debate that Kennedy's proposal
E. Howard Hunt was dangerously irresponsible and that it would vio-
Everette Howard Hunt, Jr. was in charge of the late five treaties between the U.S. and Latin Ameri-
actual invasion, using the code name "Eduardo". ca as well as the United Nations' Charter. lO
Bernard L. Barker, using the code name "Macho,"
worked for Hunt in the CIA Bay of Pigs planning. On October 22 at Muhlenberg College, Nixon really
James McCord was an organizer for the invasion and turned on the fabrication steam. He said, "Kennedy
was one of the highest ranking officials in the CIA. called for -- and get this -- the U.S. Government
Frank Sturgis, alias Frank Fiorini, was also involved to support a revolution in Cuba, and I say that this
in the Bay of Pigs operations. Virgilio Gonzales is the most shockingly reckless proposal ever made
was a CIA agent active in the Bay of Pigs and so was in our history by a presidential candidate during a
Eugenio Martinez. Charles Colson was a former CIA campaign -- and I' 11 tell you why. . .. "
official who knew McCord and Hunt during the Bay of
Pigs period. 6 The reason we must take with a grain of salt
whatever words the President utters about Watergate
Hunt, Barker, McCord, Sturgis, Gonzales, and and Donald Segretti 1 s espionage is clearly demon-
Martinez are under indictment for the Watergate strated in that October 22, 1960 speech. He not
affair. Colson is Nixon's special counsel who han- only fiercely attacked John Kennedy for advocating
dles "touchy" political assignments. According to a plan that he, Richard Nixon, secretly advocated
Time magazine, Colson brought all of the others but one that he claimed as his own creation. Not
into the re-election committee espionage project at only that, but he later had the sheer gall to brag
the request of Nixon. 7 about it in his own book as a very patriotic act.

In other words, the same basic group who worked Today, the "patriotic" act is the re-election of
for Nixon, Bissell and Co. in 1960, were also work- Mr. Nixon, and the prevention of communism from
ing for Nixon, Colson and Co. in 1972. They were taking over the White House:'
all "loyal, patriotic," anti-Communist, anti-Castro
Protection of Hunt and Co.
CIA agents with covert (black) espionage training.
They needed Nixon's protection in 1960 and 1972, and How is Nixon protecting Hunt and company now?
they got it both times. He is using the Justice Department and the Republi-
can Congressmen, plus others, to delay and dilute
In 1960 here is how Nixon protected them. 8 the prosecution of the Watergate seven. He has

34 COMPUTERS and AUTOMATION for January. 1973


slowed down. suppressed, and all but stopped six Mother's Ethel Jean Ethel Jean
separate investigations, suits, and trials of the Maiden Name Totterdale Totterdale
affair. These are: Wright Patman's House Banking Residence Witches Island. 5029 Millwood Lane,
Committee investigation, the FBI-Justice Department River Road, Washington, D.C.
investigation, a White House investigation by John Potomac. Md. (963)
Dean, a General Accounting Office investigation, a (972)
suit by the Democratic Party. and a trial in crimi- Pseudonyms Robert Dietrich. Gordon Davis
nal court of the seven invaders. Only two trials or John Baxter,
investigations have a chance of exposing the truth. Gordon Davis
One of these. a trial of Bernard Barker in Florida. Occupation Public Relations U.S. Government,
has ended with not much help. The other is an in- Consultant, au- Internal Revenue
vestigation promised by Senator Edward Kennedy using thor, government Service
his Senate subcommittee. official
Education AB, Brown Univer- CPA George Wash-
So the battle for truth boils down again to a sity, 1940 ington Univer-
Nixon vs. a Kennedy. Apparently, the only power or sity. 1950;
strength in the U.S. since 1959 able to contest LLB, George Wash-
the power of Richard M. Nixon and his cohorts is the ington Univer-
strength of the Kennedy family and name. sity, 1957
Military USNR 1940-42, U.S. Army Infantry
USAAF 1st Lt •• 1951-53 Is t Lt.,
Political Of- Bronze Star
ficer-Far East
Footnotes Comd. 1954-56
, Marital Married-Dorothy None listed
1. "Six Crises". Richard M. Nixon. Doubleday. 1962. Status Wetzel Sept. 7,
2. "The Invisible Government". Wise & Ross. Random 1949
House. 1964. Children Lisa Tiffany. None listed
3. Ibid. Kevan. Howard,
4. Brother of Earl Cabell. mayor of Dallas when David
Kennedy was assassinated. Career Movie script writ- U.S. Government,
5. Ibid. er. editor March Internal Revenue
6. "New York Times" articles on Watergate. June 18 of Time, war cor- Service 1949-51,
to July 2. 1972. respondent Life private tax
7. "Time" magazine. September 8. 1972. magazine 1943, consultant 1953-
8. This episode is related in detail in "The Invisi- screen writer 63
ble Government". 1947-48. attached
9. "Six Crises". U.S. embassy
10. "The Invisible Government". Paris, France
1948-49. Vienna.
Appendix 1 Austria 1949-50,
E. Howard Hunt Mexico City 1950-
53. Far East Com-
Who is Everette Howard Hunt? His cover identity mand Tokyo 1954-
as a CIA agent by the name of "Eduardo" during the 56. First Secre-
Bay of Pigs is well known. His novels about spies. tary consul Mon-
writing under the pseudonyms of Robert Dietrich. tevideo. Uruguay
Gordon Davis. and John Baxter. are also well known. 1957-60. Dept. of
Defense 1960-65.
Apparently Mr. Hunt had teason to disguise his Dept. State 1968-
true identity when he became an author named 70, Robert Mullen
Dietrich. At least he seemed to try and mislead the & Co. 1970-71,
publishing field. The chart below shows how Mr. Consultant to the
Hunt described himself to both Who's Who in America. President 1971-72
and Contemporary Authors. a publication listing each Awards Guggenheim fellow None lis ted
year new or recent authors. 1946
Clubs Brown University American Institute
It should be remembered that Who's Who does some (NYC), Army & of Accountancy,
checking on the person listed. while Contemporary Navy. Lakewood Bar Association
Authors does not. Contemporary Authors merely re- Country Club District of Co-
prints whatever the author sends in. Also. the only Washington, D.C. lumbia. Army &
link in the two publications between the two men is Navy. Lawyers
the pseudonym Robert Dietrich listed under Hunt's Agent: Littauer
biography in Who's Who. & Wilkinson
(NYC), office
Comparison of E. Howard Hunt & Robert Dietrich Washington Bldg.
Washington. D.C.
Who's Who in Contemporary Writings Author 1942-72, 11 books listed
Source America 1972 Authors 1963 Pseudonyms: Rob- under Gordon
ert Dietrich. Davis
Name Everette Howard Robert Salisbury John Baxter.
Hunt, Jr. Dietrich Gordon Davis;
Birthdate October 9. 1918 October 9. 1928 Contributor to
Birthplace Hamburg, N. Y. Washington, D.C. foreign affairs
Age 54 44 and poli tical
Father Everette Howard Everette Howard journals
Hunt Dietrich Hobbies None listed Sailing, shooting.
Mother Ethel Jean Hunt Ethel Jean Dietrich riding
(Continucd on next page)
COMPUTERS and AUTOMAliON for January, 1973 35
Michie - Continued from page 9

The Future
PROBLEM CORNER
Although no one has yet begun to apply relational
Walter Penney, COP structure techniques to computer chess, these tech-
niques are currently under vigorous development for
Problem Editor a wide range of other applications. In our own la-
Computers and Automation boratory in Edinburgh R. M. Burstall, H. G. Barrow,
R. J. Popplestone and others have used this approach
for writing a "teachable" program for recognizing or-
dinary objects viewed through the TV camera, with
PROBLEM 731: A SIMPLE SOLUTION special reference to ultra-fast methods for matching
descriptions in the machine and coping with partial
Bob had hardly entered the Computer Center when AI matches in a quantitative fashion. A number of la-
boratories are exploring the use of relational struc-
asked him, "Ever have the experience of telling someone tures - sometimes called "semantic nets" - for
how to solve a problem only to have him say, 'We haven't storing facts about storybook worlds extracted from
had that yet in this course; we can't use that'?" English language input. It is a matter of time be-
"Many times," Bob replied. "It's a little like speaking fore the next person to write a chess program avails
Basic English. You have to keep thinking of what words himself of the new methodology~
not to use. What brought this up?" No single technique is going to bring about a
"Joe has a problem in his course which involves finding magic transformation. But the consequences of effec-
the larger of two numbers, using a certain very simple tive methods for representing chess knowledge could
computer. It can perform only the operations of addition, be great. Progr~ms of existing type have knowl-
subtraction, multiplication, division, and taking the abso- edge-bases not significantly larger than that of a
chess beginner. If the machine look-ahead speed and
lute value. Joe's a little puzzled." . short-term memory (working space) were not better
"Why doesn't he just subtract one from the other and than human, such programs would necessarily play
see whether the result is positive or negative?" like beginners.
"That was his first thought," AI said. "But 'see
whether the result is positive or negative' is not in the in- But the speed and accuracy of modern computing
hardware, and the large scale of mechanized tree-
struction set of his computer." searching operations (Gillogly's program has, at
"Hmm. He might be able to Monte Carlo it. Try all times, a tree containing up to 500,000 possible
sorts of random combinations of the five operations board positions under review), enable these mechan-
and ... " ized ignoramuses to play at tournament level. The
"brute force" factor is evidently worth a lot of
"No need to do anything so complicated," Al inter- points on the USCF scale.
rupted. "It's very simple."
How can the larger of two numbers be determined A Much Stronger Strategy
using only the operations mentioned?
Hence if the knowledge of the chess-master were
built into a computer program we would see not mas-
ter chess, but something very much stronger. As
Solution to Problem 7212: No Losers with other sectors of machine intelligence, rich re-
AI, Bob, and Charlie began with $32, $56, and $74 wards await even partial solutions to the represen-
tation problem. To capture in a formal descriptive
respectively. After the first game they had $96, $24, and scheme the game's delicate structure - it is here
$42; after the second game, $72, $72, and $18; and after that future progress lies, rather than in nanosecond
the third game, $54 each. access times, parallel processing, or mega-mega-bit
memories.

An interesting possibility which arises from the


Readers are invited to submit problems (and their "brute force" capabil i ti es of contemporary chess pro-
solutions) for publication in this column to: Problem grams is the introduction of a new brand of "consul-
Editor, Computers and Automation, 815 Washington St., tation chess" where the partnership is between man
Newtonville, Mass. 02160. and machine. The human player would use the program
to do extensive and tricky forward analyses of varia-
tions selected by his own chess knowledge and intui-
tion~ and to check out proposed lines of play for
Sprague (continued from previous page) hidden flaws. In this way the worth of the "brute
force" component, which might perhaps be estimated
Appendix 2 as lying somewhere in the 500-1000 interval, could
Postscript actually be measured on the USCF scale.

Mrs. E. Howard Hunt was unfortunately killed in a A Wager


crash of a United Airlines jet at Chicago on Decem-
ber 8, 1972. The crash investigators found in her In 1968 John McCarthy, Seymour Papert and I com-
purse 100 crisp new $100 bills. When Mr. Hunt was bined to make a bet with a young computer scientist,
queried, he claimed she was carrying the money to a David Levy, now an international chess master. We
relative in Chicago for a real estate investment. wagered £ 1000 that he would be beaten by a chess
But it is reasonable to suspect that these bills program by the year 1978. The former world champion
bore serial numbers in the same sequential series M. M. Botvinnik has told Levy, "I feel very sorry for
as those found on Bernard L. Barker when he was your money," but M. Euwe, also an ex-world champion,
arrested, and that Mrs. Hunt was transferring "hot thinks otherwise. Levy's own comment is "Only time
money" to a new location. 0 can tell". 0

36 COMPUTERS and AUTOMATION for January. 1973


The Frenchman Who Was to Kill Kennedy

Phillippe Bernert
Camille Gilles
L 'Aurore, October 2, 1972
Paris
France

translated by
Ann K. Bradley The extraordinary confession revealed in an exclusive interview
Computers and Automation to Camille Gilles by a veteran officer of the 1st REP, ex-chief
and People of the Delta Commandos of the O.A.S., who is now raising
livestock in South America.

On May 31, 1961, from the top of an apartment building


in the Rue de Rivoli or the Champs-Elysees, ex-lieutenant
Romero of the O.A.S. was supposed to shoot down President
Kennedy while pretending to aim at General de Gaulle. The
attempt would have been called a tragic error, due entirely to
internal French problems. And no one would have dreamed
of looking for the real instigators of the plot: Americans.

"Armed with a rifle with an infra-red sight, I It was while working on his new book about the
was supposed to miss General de Gaulle and kill dozen veteran killers who regrouped, in the heart
President Kennedy. This, precisely, onMay 31, 1961, of the O.A.S., around the celebrated Jesus de Bab-
during Kennedy's official visit to France. The el-Oued ("Jesus and his apostles") that Camille
attempt was to take place on the Rue de Rivoli or, Gilles established contact with Jose Luis Romero
preferably, on the Champs-Elysees. I really didn't and uncovered the story of an earlier secret plot
need the infrared sight -- I was considered one of against Kennedy.
the best sharpshooters in the French army."
At the heart of the affair was Romero: a big fel-
The man who just made this fantastic revelation, low over 6'1", with intensely black eyes, his body
a revelation capable of turning a whole page of covered with tattoos and with scars from the splin-
contemporary history upside down, of calling into ters of a mine that exploded in Indochina. A colos-
question the famous Warren Report and breaking wide sal man whose hair, today, is entirely white. "Late
open the investigation into into a plot against in 1963, several weeks after I learned of the murder
Kennedy at the time of the Dallas assassination of Kennedy in Dallas, I woke up one morning with my
this man's name is Jose Luis Romero. hair like this. My moustache was white, and all the
hair on my body had turned White."
Nine years after Kennedy's assassination, Romero
has decided to talk. Leaving his hacienda somewhere
in South America, he made a quick trip to Paris to But this is the same man who, two and a half
sign an exclusive contract with Marcel Julian, P.O. years earlier, had agreed to kill Kennedy "for the
P.O.-G. of PIon and Julliard, publishers. This took money and the adventure". He was offered two hun-
place last Saturday afternoon. In PIon's summer dred million old francs.
garden -- they are the editors of General de Gaulle's
"Memoi rs" -- thi s veteran ki ller of the Delta com- But who is Romero? Born in Madrid ill 1926, son
mandos during the war in Algeria began to dictate of a revolutionary hunted by Franco's forces, he
his extraordinary confession to my colleague Camille sought refuge with his family in France, spent two
Gilles, well-known reporter of pied noir origin and years in a refugee camp at Argeles, near Perpignan,
chronicler of the Algerian drama in hi s novel oil sont and then joined the underground resistance with his
les roses de Fouka? (Where are the roses of Fouka?) father, who was a leader in the F.T.P. Following

COMPUTERS and AUTOMAnON for January. 1973 37


that he left France for Oran where his father, a A Strange Contract
shoemaker, started to produce espadrilles.
"I didn't have any reason to be suspicious of
When he was twenty, Jose Luis joined the French Mike's friends, so I agreed. A little later, after
Foreign Legion and fought in Indochina, then in Al- they stopped the car in the forest of Sidi Ferruch,
geria. After serving in the 2nd B.E.P. he became the spokesman for the two proposed the following
one of the best officers in the 1st B.E.P. under "contract" to me. On May 31, President Kennedy
Dufour, Sergent, Denoix de Saint-Marc. He found would be in Paris on an official visit. I was sup-
himself among those responsible for keeping the posed to fake an attempt on the life of General de
Casbah under control. It was around 1958 that Lt. Gaulle (an almost classic phenomenon at present:
Romero became friends with a counselor at the insurrection in Algeria, trial of Generals Challe
American consulate in Algiers, a friendship founded and Zeller in Paris, etc.) and to "accidentally"
on confidence and mutual esteem. kill Kennedy, at the moment when he would be next
Mysterious Mike to the President of the French Republic."

The American, whom we shall call Mike from his "My interlocutors knew exactly who they were
code name, worked visibly for certain U.S. secret talking to. They seemed to know my record as a
service organizations. But at the same time he sharpshooter, that I hit the bullseye 98 times out
showed himself to be very sympathetic toward ele- of 100. They offered me $400,000 -- half right
ments in the French Army that wanted a French Al- away, the rest once the thing was over."
geria. He even said one day to Jose Luis (whom
he called "Gt::orge"): " -- But you have to make up your mind now.
Drop everything and come with us."
"I know certain U.S. financiers who wouldn't be
unhappy to put their money into Algeria. But in a "I accepted. They took me immediately to the
French Algeria or, at least, an independent Algeria little port of Bou-Haroun, near Castiglione. There
that was dominated by European interests." they gave me a Swi ss passport in the name of Broeger,
issued April 20, 1961 by the Canton of Geneva. Then
In brief, like Lt. Romero, Mike showed himself they put me on a French trawler that sailed that
to be violently anti-Gaullist and anti-communist. night. The sea was rough and I suffered down in
And when part of the Army revolted and formed the the hold on my air mattress. The whole night the
O.A.S., Mike kept up hi s contacts wi th Romero and boat resounded with hammer blows. The next morn-
provided him with information, false passports, mo- ing we reached the small Spanish port of Andraix di
ney, arms, and explosives. Porto."
At this time Romero, who had organized the Delta "Curiously, the trawler was no longer French ~ut
commandos, had shed his uniform and was strictly a was flying the Spanish flag, with a Spanish maritime
clandestine operator, going around in cotton knit registry number. A Seat, a Spanish-made car, was
shirts, light chinos and string sole shoes, shoes waiting for us on the quay. We drove for three long
all the Delta commandos wore because they were ideal hours, but it seemed more like centuries to me. Af-
for running and for scaling walls without slipping terwards I found out that the villa they were taking
and falling. me to was actually only twelve miles from Andraix."
This is what he was wearing one evening in May, "At the villa I was able to shower, shave and
1961, on his way to a meeting his friend Mike had change clothes. I found a shirt, suit and a pair
arranged with him at a Vietnamese restaurant in of shoes, all in my size, but there was nothing in
Algiers, the Madrague, not far from the sea. Every- any of them to show where they came from. I also
thing started that night. Here is how Romero told saw my friend Mike again there, but it was for the
it Saturday to the man writing this incredible his- last time. The diplomat who had helped us so much
tory, the journalist Camille Gilles: in Algeria greeted me effusively."
"Mike was supposed to bring me some false pass-
ports so that some of our men could rejoin Capt. " -- I knew you'd come I" he said.
Sergent, chief of the O.A.S., i,n continental France.
I left my two bodyguards standing outside the res- "Mike completed my transformation into a Swiss
taurant, in front of the door, and slipped my Luger citizen by giving me a Swiss driver's license in
under my bath towel that I'd left lying on a chair the name of Broeger, a membership card to a private
beside me." club in Geneva, and the number of my bank account
in Lausanne where $100,000 in West German marks had
"A few minutes later two men came in and, with- already been deposited in my name. It had been
out hesitating a second, walked over to me and sat agreed that my pay would be entirely in marks."
down ,at my table. With their typical walk, as if
"And for a start," Mike announced, "We are going
they were afraid of breakini eggs, and their black
to give you your first $100,000 right now, for your
hats with the wide ribbon, they had to be Yankees. trip."
They came, they told me, from Mike.
Prelude to Dallas
"First of all they gave me the passports Mike
had promised me, as well as a plain envelope filled "They gave me a belt that I put on, with the
with bank notes. They said it was for the O.A.S. Deutsch marks in slits on the inside. First I
We had dinner together. Then t after we had finished t went to Geneva, where a car was waiting that took
the bigger one, the one who did the most talking me to Lausanne. The second half of the funds had
(the other seemed content with monosyllables) sud- already been deposited in my account there. I
denly said to me: withdrew the money and was careful to redeposit it
in a new account. The evening of May 30, I was in
"I want to talk to you seriously. I want you Paris."
to get rid of those two gori lIas that are wai ting
for you outside and then we'll go for a ride so I "I immediately took a cab to a cafe in the Champs-
can explain to you what I have in mind." Elysees, 'Le Paris'. There a contact gave me a plan

38 COMPUTERS and AUTOMATION for January. 1973


that I still have -- in a safe place. The plan of- give my employers the slip at this point in the
fered me three alternatives. The first was to fire game? The best way, I figured, was just to pre-
on Kennedy from the top of an apartment house on the tend I was still going through with the whole thing.
Rue de Rivoli, along the route the presidential mo- So I caught the subway at the George-V station and
torcade was to take. It gave the addresses of two got off at the Gare du Nord. There I went up to
apartments, along with the names of their occupants the woman selling papers and asked her loudly where
both of them old people living alone, who could the toilets were."
be locked up in another room while I was taking care
of things at the front window." Stop

"The second possibi li ty was to try to shoot Ken- "To get my contact, as well as the men following
nedy from one side of the Place de l'Etoile, just as me, to wait for me by the newsstand, I went off in
the two presidents were getting out of their car to the direction of the toilets. But since I knew the
approach the tomb of the Unknown Soldier. Here again, station like the back of my hand, I slipped out as
an apartment had been selected that was on the next soon as I could and then ran what must have been a
to the last floor and had windows that were well lo- record hundred meters. Then, figuring I'd given
cated for our purposes. This was the same tactic everyone the slip, Iwent back to the Porte d'Italie.
Oswald used two years later in Dallas I didn't even try to stop at the hotel. With my
belt still stuffed with Deutschmarks, I hitched to
"The gun I was supposed to use, a Remington car- Nice. My Swiss passport got me into Italy and from
bine 280 wi th an infrared sight, was in a small trunk there I went on to Lausanne."
in the baggage room at the Gare du Nord. To get the
key to the trunk, I had to go to the Lost and Found "Once in Lausanne, instead of foolishly putting
at the station and stand near a particular newsstand, in a personal appearance at the bank, I asked to
where a man would give it to me." have my account transferred to another branch. There
I had the bank change the marks in my account into
"It was up to me to choose the place where I dollars. Then, with my little bundle safely tu~ked
wanted to shoot, but either way my contacts promised away, I returned to Rome. Since I was still afraid
me a safe escape -- cars would be waiting near each of being followed by Mike's friends, I ended up en-
of the si tes to make sure I got away wi thout a trace." listing with a group of mercenaries that were leav-
ing for the Congo. No one was going to find me
"I don't know why, but on my way to my hotel in fighting in the Congo -- it was the ideal hiding
the Champs-Elysees, to think things over, I suddenly place. After the Congo business was over, I hit
felt very uneasy. All at once it hit me what a the road for South America. With the money Mike
really shrewd plan my employers had come up with. had given me, the money that was supposed to pay
The "accidental" murder of Kennedy was to be blamed for Kennedy's assassination, I finally set myself
on the O.A.S. which, they would say, had decided to up there in a hacienda where I'm now happily rais-,
kill de Gaulle but failed. A nice, neat 'secret ing bulls."
plot' story that would cover their own trail per-
fectly." "This whole story might sound crazy to you, of
course. I know what it implies -- that from 1961
"I said to myself that this small group of Ameri- on there were men trying to eliminate Kennedy by
cans had chosen me not just for my strong anti-Gaul- means of a hired killer. Maybe the same men finally
list feelings, but also so that, if I were ever cap- succeeded two years later in Dallas, with Oswald.
tured, people would think I was a li ttle "cracked". Why did I wait so long to talk? Because my friends
I had to have a trepaning operation in Indochina told me the time had come to explain some things,
after I was wounded in a mine explosion. So, if I because my former commanding officers in the O.A.S.
started talking in front of police and judges about gave me the green light -- and because I decided
a U.S. plot against Kennedy, they would simply fig~ when I met Camille Gilles that he was a journalist
ure I didn't know what I was talking about." who deserved to write this story."
Algiers Intervenes "1 will no doubt be asked to prove what I'm tell-
ing you. The proof exists, and the men who contact-
"And then, almost as if I'd foreseen Oswald's ed me know it. It's now safely in the hands of a
fate -- to be killed only 24 hours after shooting lawyer in Geneva: letters I exchanged with 'Mike't
Kennedy in Dallas -- I told myself 'This is too big. the American diplomat; the three passports they
They'll never let you live after you finish the job; gave me; the addresses of the Paris apartments that
they'll have to get rid of you.' Anyway. I was wor- were supposed to be used; the names of the people
ried enough to ask my commanding officers in the living there; the actual written plans I got from
O.A.S. for their advice." the go-betweens, and the little official notebook
they gave me that described in detail the schedule
"As soon as I got back to the hotel I put in a Kennedy was to follow."
call to Algiers. I told the O.A.S. staff there
honestly what the situation was. My colonel said, "I'm not talking for money. I'm rich and happy
'I'll call you back in half an hour. Don't make a already. I spend my life on horseback, in the
move until you hear from us.' Half an hour later middle of my herds. I've had enough of adventure.
the order came from Algiers. 'Don't touch this But the moment of tr11th always arrives. There are
deal. Let the Americans take care of their own certain things you can't keep to yourself forever ... "
dirty business. The whole thing is likely to back-
fire on usl' I may be wrong, but I think that Gen- Saturday evening, ex-lieutenant Romero was back
eral Salan himself was consulted about it and that in South America. He is corresponding by means of
he was the one who made the final decision. The tape recordings with his biographer, Camille Gilles,
O.A.S. saved Kennedy's life that day." and his editor, Marcel Julian. Will we, thanks to
the revelations of this solitary adventurer, finally
"My problems were just beginning though, because be able to penetrate the darkness surrounding the
I'd felt I was being followed ever since I'd left death of Kennedy in Dallas? Was the attempt that
the Vietnamese restaurant, "La Madrague", near misfired in Paris nothing but a dress rehearsal
Algiers -- guarded, but watched, too. How could I for the tragedy that shook the world? []

COMPUTERS and AUTOMATION for January, 1973 39


Why I Distrust the Romero Story self? He says he was afraid, which may account for
him, but the question is, why should we believe?

There are curious details in Romero's story that


Robert P. Smith, Director of Research make no sense to me:
Committee to Investigate Assassinations Item 1: Why an "infra-red sight" on the rifle
~927 15th St., N.W. when the assassination is to take place in
Washington, D.C. 20005 broad daylight?

Item 2: Why did Romero, while going to what he


As Director of Research for the Committee to In- expected was merely a rendezvous with his
vestigate Assassinations, I sit at the hub of a "friend" Mike, take along two bodyguards?
sort of wheel of information. Some may say, per-
haps not without cause, that it is a wheel of mis- Item 3: Why later, at the restaurant, but still
information. Certainly there are some rickety before he knows that anyone besides Mike is
spokes to it, and it isn't always easy to keep from coming, does he place his Luger under a
running off the road. After long practice, though, towel on the next chair?
and after having read and heard a lot of stories, I
think I may have acquired some skill in avoiding the Item 4: How can he be a "sharpshooter for hit-
more obvious ditches. ting 98 bull's-eyes out of a hundred", with
nothing said about the distance of the tar-
I. F. Stone, now with the "New York Review" but get or any of the other details needed to
whose "Newsletter" was rightly regarded as one of the attach significance to such a figure?
best in the country for many years, is said to have
called the efforts to solve the mysteries of Presi- Item 5: Why couldn't Romero have been given the
dent Kennedy's assassination a "swamp of paranoia". key to the trunk (containing the special rifle)
He may be partially right. in advance, instead of using another man to
give him the key, with the added and unneces-
But with all deference to psychoanalysis, I sub- sary risks that this implies? (After all, they
mit that the investigation of President Kennedy's had already given him the money and other
assassination is a good deal more. It is, for one papers.)
thing, a serious avocation for some very sincere and
competent people who are trying to find out what These dubious details, of which many other examples
really happened on November 22, 1963. Our Government could be cited, sound more like melodrama than
has failed to explain it satisfactorily. reali sm.

Secondly, it is a challenge to a number of dedi- There is more to this story -- not Romero's, but
cated researchers and students of the factual de- the story about Romero's story. Not all of it is
tails of the assassination. Some of them are pro- yet known to me, but I do know that CBS, which is
fessionals in their own fields, and they find this certainly a large and competent news organization
case, quite literally and for absolutely objective with offices in Paris, spent a fair amount of time
and non-neurotic reasons, to be more baffling than and money checking it out.
any Sherlock Holmes story ever written. I do not
exaggerate. Actually, they were drawn into it by a later em-
bellishment in which Romero purportedly identified
Those opinion leaders who believe this case is two of the "Watergate Five" as being the two Ameri-
solved cannot have tried to grapple with the physi- cans who approached him in 1961. This added sensa-
cal evidence of the case. Their persistence in tion involved some intermediaries who, I am con-
pooh-poohing the problems of reconstructing the ac- vinced, were entirely sincere in their beliefs. But
tual shooting, for example, reflects a kind of para- the end result of all this effort was a flat zero.
noid gullibility of their own. The news organization concluded that the whole busi-
ness was a hoax. I had previously come to the same
belief for the reasons I have stated above.
Thirdly, and unfortunately, pursuit of the facts
behind the JFK assassination tends to be an abode Does this imply that the CBS investigation was
for a certain number of jokers and opportunists who CIA-controlled, and that the CIA influenced it to
are out to make a buck by exploiting the gullible. arrive at this conclusion?
With these I have lost all patience. They interfere
with the serious things that need to be done, and The answer is that I don't know. I haven't any
they bring ridicule on the genuine efforts at under- evidence either way. But why should I impugn the
standing. integrity of a large organization involving many
people, in effect assuming that they were Q!l CIA
In regard to the killing of President John F. Ken- influenced, in favor of believing the story of one
nedy, it is an unpleasant but very real fact that one man who has no corroboration from anybody and who
can find in the National Archives many scores of re- keeps his supposed evidence locked up in a vault
ports about people who said they wanted to kill the somewhere? Particularly I cannot believe him when
President, or who expected someone to do it, or who his story fails to hang together and when I know at
claimed they knew someone who actually planned to do least a half-dozen similar kinds of story (contra-
it. I have read a great many of these reports. dictory to Romero's, however) which are just as
"plausible" as his.
The motives, or implied motives, are allover the
political spectrum. Moreover, some of the stories Finally, I ought to make one other point that may
were on record before the assassination and were appeal to those who insist on reasoning from motives.
every bit as plausible, from any standpoint, as the I do believe that Romero was (and is) part of a con-
Romero story. So why should we believe Romero, whose spiracy. Cui bono? Yes, a good question and
story didn't come to light until nine years after the here's my answer: The conspiracy was one to sell
JFK assassination and eleven years after the plot it- books I 0

40 COMPUTERS and AUTOMAliON for January. 1973


ACROSS THE EDITOR'S DESK
Computing and Data Processing Ne,wsletter

Table of Contents

APPLICATIONS NEW PRODUCTS

Computerized Feed Mixing Begins at Gooch Mill 41 Nova Computer Becomes Teacher's Aid in 43
Minicomputers Deliver Daily Newspapers 41 New Singer Driver Training System
in Fort Worth, Texas Computer Program Helps in Treatment 43
of Heart Patients
EDUCATION NEWS Risk of Analysis Program Announced by 43
McDouglas Corp .
. New Prison Arrival Sparks Computer 42
Programming Studies MISCELLANEOUS
General Turtle, Inc. ~ A Small Company 42
With a Strange Name SDA Information Sciences, Inc., Elects 45
President and Chairman of the Board

mill such as Gooch, which can produce 700 tons, or


APPLICATIONS 1,400,000 pounds of feed a day.

COMPUTERIZED FEED MIXING MINICOMPUTERS DELIVER DAILY


BEGINS AT GOOCH MILL NEWSPAPERS IN FORT WORTH, TEXAS
Mervin Eighmy, Gen. Manager
Millard Farmer, DP Manager A. T. Le Ance
Gooch Feed Mill Corp. Computer Automation, Inc.
Lincoln, Nebr. 18651 Von Karman
Irvine, Calif. 92664
Gooch Feed Mill Corp. has begun using a small com-
puter to control the measuring-in of ingredients for In Fort Worth, Texas, a minicomputer is the heart
its animal feeds. Until now the process of compound- of a new Automated Newspaper Delivery System (ANDS).
ing numerous ingredients has been largely manually The ANDS (developed and produced by AVCON, Inc., of
controlled. The System/7 computer, using predeter- Fort Worth) is a self-contained, on-board system
mined feed formulas stored in its memory, calls out which guides a delivery truck along a complex route
the precise amount of each of up to 20 ingredients and tells two men on either side of a specially de-
for any of 20 different feed mixes. The feed formula signed vehicle, when to throw their papers. Accord-
itself is determined by another IBM computer based on ingto the AVCON people, they never miss.
the nutrient requirement of the particular animal to
be fed, also taking into account the unit cost of The system continuously measures the vehicle's
each ingredieni. location in relation to a pre-planned route, then
issues audio and visual instructions which guide
The feed is mixed in three-and-one-half ton mix- the driver and the paper throwers on their appointed
ers. Because there is such wide variation between rounds. It even activates the vehicle's turn sig-
the amounts of the several ingredients needed, a nals shortly before it is scheduled to make a turn,
blend may call for a quantity weighing as little as giving the driver added warning of the impending
an ounce and as much as a ton or more. When a par- maneuver. In addition, the ANDS detects driver
ticular kind of feed is called for, an operator errors and immediately prescribes appropriate cor-
merely enters the feed number into the computer. The rective actions.
computer automatically begins selecting ingredients
stored in any of 50 bins. The System/7 transmits a Because of the system's unique guidance capabili-
signal to the selected bin, which sets in motion an ties, neither the driver nor the throwers need maps,
auger. The auger starts pulling out the selected subscriber lists, or prior knowledge of the route.
ingredient into an enclosed chute which empties on It is all done by tape and computer memory. First,
to a scale. As the ingredient hits the scale, the a fixed route is divided into segments and a "sig-
computer begins measuring the weight, shutting off nature" for each segment is recorded by driving
the auger when the precise weight has been reached. over the segment with the AVCON system operating
in its mapping mode. Locations of delivery points
If when selecting the desired bin -- say of soy- are recorded in terms of their distance from the
bean meal -- it is empty, the computer signals the beginning point, when the driver or an assistant
operator that is should be refilled, and goes on to depresses a switch at each location. For basic
the next soybean meal bin for its needs. This en- route control, verbal instructions are recorded on
sures that the mixing process will not be interrupted audio tape. To travel over a previously mapped
as long as the needed ingredient is available in any route, the driver simply starts the route at a
bin to which the computer has access. specified point and follows the system's real-time
audio and visual commands.
Besides more accurate feed mixes, there is better
control of inventory. For the first time Gooch Mill The paper throwers mounted by open windows on
can track the precise amount of each ingredient from either side of the van wear earphones that receive
the time it arrives at the mill until it leaves in the signals telling them when to hurl their rolled-
the completed blend. This is a major factor for a up papers. Lead times for the throwers are auto-

COMPUTERS and AUTOMATION for January. 1973 41


matically adjusted to the speed of the truck, which have amounted to over $700,000 in four years, even
may be traveling anywhere from 15 to 30 miles an after deducting wages of 50 cents per day paid to
hour along its routes. inmates and the costs of keeping a man in prison.
The system hardware is mounted above the truck's Before installation of the Honeywell Model 55
windshield, except for a digital display console none of the inmates had seen a computer. They wrote
which is mounted atop the dashboard in front of the their programs and keypunched them on cards or coded
driver and provides visual instructions. The ANDS them with a Honeywell Key tape (provided by the state
includes a miniature NAKED MINI 16 digital process- Department of Education) onto magnetic computer tape.
ing and logic unit (built by Computer Automation, The card decks and tapes were picked up twice a week,
Inc., Irvine, Calif.), a tape cartridge drive, pro- transported to a "client" computer si te where the
prietary sensing devices, control/display console programs were run. The results were returned to the
with message printer, and a variety of annunciator inmates later for corrections. Having their own com-
and actuator devices. puter will enable inmates to work on program devel--
opment and to tryout their ideas while they are
fresh. There will be greater continuity between
each phase of development, -- and the Walpole pro-
EDUCATION NEWS grammers will be able to supply their clients with
finished products.

NEW PRISON ARRIVAL SPARKS The computer also will permit expansion of the
COMPUTER PROGRAMMING STUDIES program to include computer maintenance and operator
training courses. Instructors from HoneywelPs Field
Honeywell Inc. Engineering Division have begun teaching a group of
60 Walnut St. six inmates the computer maintenance courses. This
Wellesley, Mass. 02181 program also will be self-perpetuating. Operator
training courses will be conducted by the Walpole
A new "inmate" has been welcomed to Massachusetts programmers. This course will be aimed at men who
do not have enough prison time left to complete pro-
maximum security prison at Walpole, Mass. The new
gramming courses or who are more interested in com-
resident of the prison is a computer to be used by
puter operation than programming.
prisoners who study computer programming. The com-
puter, formerly in Honeywell's custody, is being
loaned permanently to the inmates.
GENERAL TURTLE, INC. - A SMALL
For the past five years, volunteers from the com-
COMPANY WITH A STRANGE NAME
pany have been teaching programming courses to a
group of inmates at the Massachusetts Correctional General Turtle, Inc.
Institution (MCI) in Walpole in response to an
545 Technology Square
inmate-initiated request for courses in computer
programming. The career-training program has paid Cambridge, Mass. 02139
off in both professional accomplishment and an ex-
A new educational technology has recently become
tremely low recidivism rate for those in the group
available from General Turtle Inc. -- a small com-
who have been paroled -- only 4 1/2 per cent com- pany with a strange name. General Turtle Inc. has
pared to a national rate of 68 per cent.
been formed in response to requests from schools and
Malcolm D. Smith, a professional teacher and pro- research groups for computer-controlled devices sim-
grammer who was then a Honeywell staff adviser in ilar to those used in the program of Research on
programming systems, was in charge of setting up the Education conducted by the "LOGO GROUP" of MIT Arti-
program, which he designed to be self-perpetuating. ficial Intelligence Laboratory.
When students complete their first course, they
teach what they have learned to a new class, at the The set of devices, developed by the new company,
same time beginning the second phase of their own is designed to be compatible with the financial,
program. Students in the first phase of the program technical and computational resources typically
work at other prison jobs during the morning and at- available in schools which already are using a mini-
tend classes in the afternoon. Those who success- computer or telephone connections to a time-shared
fully complete the courses join the group of 12 men service The devices have, however, been designed
who are fUll-time programmers. to serve even better where more computational re-
sources are available -- so that when computer re-
The Walpole programmers have complete responsi- sources grow, these devices will not become obsolete
bility for conducting classes for students in the but will also grow in power.
first phase of the program, as well as for the pro-
fessional programming work done for the state and By means of General Turtle's devices, schools can
municipalities. They also attend advanced classes extend the range of programming projects to include
conducted by Honeywell instructors. According to generating music, graphics, controlling cybernetic
Smith, now manager of Honeywell's Conversion Tech- turtles, and more. The new applications reach more
nology Center and still head of the Honeywell group, students and also deepen the intellectual content of
"The Walpole instructors have been extremely meticu- the computer experience. They appeal to "mathepho-
lous in their teaching. The way they have handled bic" children who find traditional programming "too
their teaching and programming responsibilities mathematical" as well as to "math buffs" who want
shows they are very competent professionals." something involving more hard core mathematics.

In addition to these significant personal accom- The recommended starter mini-system includes the
plishments, the Walpole programmers have been doing following components: turtle with touch sensors;
professional programming for the state departments plotter; music generator; a components kit of motors.
of Education, Natural Resources, and Corporations relays and sensors, and a controller to connect the
and Taxation, and for several cities and towns in precending devices to a freestanding or remote
Massachusetts. Estimated savings to thei r "clients" computer.

42 COMPUTERS and AUTOMATION for January. 1973


The simplest mode of operation of the mini-system minute. A wide variety of conditions, including
requires no expertise in hardware or systems soft- labor strikes and weather, can be considered to de-
ware and no changes to the operating system or lan- termine the possible effects on the contractor's po-
guage already in use. Other modes of operation re- tential profit on a project. The contractor need
quire small changes to the system software. General have no knowledge of statistical variations and
Turtle will design configurations to meet individual standard deviations. He simply identifies those
needs, plans, and budgets. cost items which can vary by more than one per cent
of the total anticipated profit. The program pro-
duces eight management reports which may be used to
examine company risks involved in making a bid.
NEW PRODUCTS
CEWS is available exclusively through a process-
ing or licensing agreement from McDonnell Douglas
COMPUTER PROGRAM HELPS IN Automation Company, a division of McDonnell Douglas
TREATMENT OF HEART PATIENTS Corporation.

Robert A. Morris NOVA COMPUTER BECOMES TEACHER'S AID


Manager of Information IN NEW SINGER DRIVER TRAINING SYSTEM
IBM Corporation
Data Processing Division Data General Corp.
1133 Westchester Ave. Routes 9 and 495
White Plains, N. Y. 10604 Southboro, Mass. 01772

From the time Janet Austin began her across-


Cardiologists can interpret large volumes of
electrocardiograms -- used in identifying heart town drive to the moment she backed into a parking
space and turned the engine off, everything she
disorders -- faster and more easily with a new
computer program recently announced by IBM Corpora- did was meticulously noted and recorded by a small
Nova computer, made by Data General Corporation of
tion, White Plains, N.Y. Using the IBM Health Care
Southboro, Mass. Janet was one of a group of high
Support Electrocardiogram (ECG) Analysis program,
school students "dri vi ng" a new LinkGJ Model L-210
cardiologists can significantly reduce the time it
simulator, a streamlined driver training device
normally takes to analyze ECGs (recordi ngs of the
heart's electrical impulses). They can then speed that looks like the driver's section of a new car.
their interpretations to attending physicians for It has dashboard instruments, steering wheel, gear
use in dingnosis and treatment of heart patients. selector, and driver's seat. The trainer is made
by The Singer Company's Simulation Products Divi-
When the new ECG Analysis program, an IBM Sys- sion, Binghampton, N.Y.
tem/370 or System/360 processes -- in less than a
minute -- the ECG readings which have been recorded The Nova, mounted in a small cabinet under the
in digital form on magnetic tape. The computer instructor's control console, lets the instructor
produces a printed report containing interpretative monitor the actions of an entire group, part of a
statements about the condition of the patient's group, or an individual. The instructor can select
heart. Cardiologists can quickly validate the percentage levels of achievement at the console,
statements by comparing the printed report with the and the Nova indicates which students fall below
strip chart recording, which are then sent to the that level.
patient's doctor.
Students "drive" on a realistic motion picture
The Health Care Support Electrocardiogram (ECG) roadway projected on a screen at the front of the
Analysis program is scheduled to be available in room. A binary code track on the film triggers the
February 1973, at a monthly charge of $350. Nova, which starts all the automatic functions of
the system, and monitors student responses to vari-
ous driving situations. Some of the automatic
functions handled by the Nova are:
RISK ANALYSIS PROGRAM ANNOUNCED
BY MCDONNELL DOUGLAS CORP. • checking student responses to filmed situa-
tions
McDonnell Douglas Corp. • displaying results on the instructor's
Box 516 console
St. Louis, Mo. 63166 • indicating when group performance needs im-
provement
The construction business, like a poker game,
involves a great many risks. Poker is less a gam- Student errors are classified in five categories
ble, though, when the odds are known and the hands acceleration, speed, braking, steering, and sig-
played accordingly. nal. When a student makes a mistake, an indicator
in the simulator lights, and stays on until the
To help take some of the gamble out of the con- student takes corrective action. The Nova keeps a
struction business, McDonnell Douglas Automation running check on the number of checks in each of
Company is marketing and processing a computerized the five categories and the number of errors for
risk analysis program developed by Decision Sci- each student in each category. When a class is
ences Corporation, St. Louis. Called Contractor's over, the instructor can determine such information
Early Warning System (CEWS), the program helps re- as total checks by category, total errors for each
duce the risk involved in construction cost bidding student in each category, and the student's score.
by alerting a contractor to a possible cost overrun An optional package lets the instructor accumulate
soon enough to allow him to adjust his bid. student performance over a period of time. In ad-
dition, the instructor can override the computer
Using McDonnell Douglas's IBM Model 195 computers, and make unprogrammed checks into the system.
5000 simulations can be performed in less than one (please turn to page 45)

COMPUTERS and AUTOMATION for January, 1973 43


~
I
NEW CONTRACTS

Sanders Associates, Inc., Lockheed-California Co. Long lead preparation and startup costs $6 million
Nashua, N.H. on second production lot (Lot IV) of ac- (approximate)
coustic data processors for Navy's new S-3A
carri er-based anti -submari ne warfare a ircra ft
Burroughs Corp., Detroit, National Life and Accident Electronic terminal computers and other $4.5 million
Mich. Insurance Co., Nashville, equipment for use in nationwide communi-
Tenn. cations system
TRW Inc., Cleveland, Ohio Swedish State Power Board, A Totally Integrated Data System (TIDAS) $3 million
Stockholm, Sweden for electrical power production and power (approximate)
system control; TRW's role includes inte-
gration of total system, and design and
fabrication of central data processing sys-
tem; ASEA is prime contractor for the $15.5
million proj ect
Computer Sciences Corp., Strategic Air Command (SAC), Serving as prime contractor for the inte- $2.1 million
Los Angeles, Calif. Omaha, Neb. gration phase of the 436M program at SAC's
Omaha headquarters; includes supply of all
equipment, computer programs and engineer-
ing services
Sperry Univac Div., Sperry South African Coal, Oil and A UNIVAC 1106 system to be used for linear $1.8 million
Rand Corp., Blue Bell, Pa. Gas Corp. (SASOL), Sasolburg, programming, production statistics and (approximate)
Orange Free State, South other general office and general account-
Africa ing applications
Honeywell, Inc., Tampa, Safeguard Communications An automated communications circuit-moni- $1.7 million
Fla. Agency (SAFCA), Grand Forks, toring system
N. Dak.
TBS Computer Centers Corp. Catalina and Cole of Califor- 3-year renewal of original contract pro .. $1.5+ million
(NASDAQ: TBSC) , New York, N.Y. nia , Inc. , di v. of Kayser-Roth viding various data processing services
National Cash Register Co., United States Postal Service A number of service test models of the $1.3+ million
Postal Systems Division, Day- Postal Service's advanced facer/canceler
ton, Ohio machine for high-speed automatic process-
ing of letter mail
Intermetrics Inc., Cambridge, North American Rockwell (NR) A high-level computer programming language, $1 million
Mass. Space Div., Downey, Calif. designated HAL, tailored specifically for (approximate)
Space Shuttle's flight computers
Autonetics Div., North American U.S. Department of Transpor- Studying and defining an air traffic man- $948,171
Rockwell Corp. (NR), Anaheim, tation agement system for the 1985 and beyond
Calif • time period
SYSTEMS Engineering Labora- NASA's Manned Spacecraft Dual SYSTEMS 86 computers to be used as $925,000
tories, Inc., Fort Lauder- Center, Houston, Texas part of dedicated hybrid digital/analog (approximate)
dale, Fla. complex for agency's space shuttle program
Varian Data Machines, State Bank of Czechoslovakia, Multiple Varian 620/L-IOO minicomputers, $810,000+
Irvine, Calif. Prague and Bratislava, multiplexers, controllers, adapters and
Czechoslovakia other devices for use in eight bank data
acquisition and communications systems
Honeywell, Inc. Australian National Line, A Honeywell Series 2000 computer system $750,000
Wellesley Hills, Mass. Melbourne, Australia to control ANL's central booking office
for its passenger ships, to rationalize in-
ternal supply and purchase accounting sys-
tems, and monitor container movements in
Austral1lsia
SYSTEMS Engineering Labora- National Severe Storms Labora- SYSTEMS 86 computer for research methods $362,000
tories, Inc., Fort Lauder- tory (NSSL), Norman, Okla. program related to weather predicition (approximate)
dale, Fla. and storm notification throughout the
central United States.
Optical Scanning Corp., U.S. Navy Thirty OpScan 17 Optical Scanning systems $250,000
Newtown, Pa. for use at Naval Air Training stations to (approximate)
process pilot evaluation forms
Bunker Ramo Corp., Westlake Colonial Pipeline Co., At- A major expansion to the dual BR-340 com- $175,000+
Village, Calif. lanta, Ga. puter system.
Computer Audit Systems, Inc., U.S. Comptroller of Currency Installing a customized version of Com- $67,000
East Orange, N.J. puter Audit Retrieval System (CARS 2) to
help agency achieve a unified program for
national bank examinations
Auerbach Associates, Inc., u.S. Department of Commerce, Designing National Fire Loss Data System
Philadelphia, Pa. National Bureau of Standards, (NFLDS) to serve as central source of data
Fire Technology Div. concerning fire losses, fatalities, and
injuries in U.S.
Bunker Ramo Corp., Electronics McDonnell Douglas Automation Development of a factory data entry system
Systems Div., Westlake Village, Co., Long Beach and Torrance, to be installed initially at DAC's Long
Calif. Calif. Beach and Torrance facilities
Computer Sciences Corp., National Can Corp., Chicago, Development of a nationwide on-line informa-
Los Angeles, Calif. Ill. tion system linking more than 40 manufactur-
ing plants with a central computer facility
at NCC's headquarters
Quantum Science Corp., Palo State of Israel A study of Israel's data communications re-
Alto, Calif. quirements through the mid 1980's -- recom-
mendations on services to be offered, tech-
nologies to be used, tariff policies for
communication network

44 COMPUTERS and AUTOMATION for January. 1973


NEW INSTALLATIONS

Cyber 70 Model 73 system Philco-Ford Corp., Houston, Scientific data processing for the National Aero-
Texas nautics and Space Administration (NASA); applica-
(2 systems) tions include data management of multiple data
bases, data base maintenance, inter-processor com-
munications with NASA's RTCC and processing of
Earth Resources data
DECsystem-l055 Plessey Telecommunications, Software development, testing and exchange inter-
Liverpool, England face integration before installation at interna-
tional telephone exchange currently under con-
struction in London
IBM System/3 Braille Institute of America, "Talking Book" service which helps librarians
Inc., Los Angeles, Calif. gather and mail out tons of recorded books to the
blind; system will eventually handle cassette tape
recordings, Braille books and recorded periodicals
IBM System/7 Cook County, Chicago, Ill. Helping reduce air pollution; monitors pollution
levels in county and spots dangerous pollution
buildups for early corrective action
IBM 360 system Florida Software Services, Providing data processing services to clients
Orlando, Fla.
NCR Century 50 system Present Co., Inc., Rochester, N.Y. New inventory control system
Wilmorite, Inc., Rochester, N.Y. Payrolls, accounts payable, and job costing for
firm and two other associated companies
NCR Century 101 system Rochester Germicide Co., Rochester, Managing invoicing system
N.Y.
UNIVAC 1106 system Fisher-Price, East Aurora, N.Y. Order entry and order status systems, on-line in-
quiry for credit and collections, a complete as-
sortment of sales and marketing statistical re-
ports and summaries
(system valued at $1.3 million)
State Universi~y of New York (SUNY), Added capacity permitting improved administrative
Buffalo, N.Y. computer services; replaces older computer equip-
ment
UNIVAC 9200 system City of Santa Fe, Santa Fe, New Payroll, general accounting, paving assessments,
Mexico criminal statistics, and a system for municipal-
ity's "Model Cities" program
Mr. Insurance, Smyrna, Ga. Policy accounting and statistical reports
UNIVAC 9200-11 system Chiltonian Limited, London, Sales ledger, sales analysis, stock control and
England payroll and an extended management information
system; replaces tabulating equipment
UNIVAC 9211 system Mahoning Valley Joint Vocational Training students for opportunities in data pro-
School, Canfield, Ohio cessing; future use includes administrative tasks
Xerox Sigma 3 system Air Combat Maneuvering Range Monitoring pilots' performance in Air Combat Man-
Xerox Sigma 5 systems (ACMR), Marine Air Station, euvering Range (ACMR) -- Sigma 3; Missile simula-
Yuma, Ariz. tions and computing missile hits and misses --
Sigma 5; computing spatial position and inter-
aircraft parameters -- 2nd Sigma 5; and 3rd Sigma
5 will control the other computers as well as two
interactive display systems

Across the Editor's Desk - Continued from page 43 SDA Information Sciences, Inc., a publicly held
corporation with stock traded over the counter, con-
ducts market research studies and surveys in many
MISCELLANEOUS areas. These have included
toiletries, drugs, foods,
banking, packaging, adver-
tising, household commodi-
SDA INFORMATION SCIENCES, INC. ELECTS
ties, and airlines. It
NAOMI J. SPINNER PRESIDENT AND supplies interviewing na-
CHAIRMAN OF THE BOARD tionwide; study question-
naire and sampling design;
editing, coding, tabula-
Frances Greenberg tion of data, and prepara-
SDA Information Sciences, Inc. tion of a final printed
1540 Broadwav report with tables and
New York, N. Y. 10036 analysis.

At a recent meeting of the Board of Directors of The corporation has a


SDA Information Sciences, Inc., Naomi J. Spinner wholly-owned subsidiary, SDA Systems, Inc., a com-
was elected President and Chairman of the Board. pany which specializes in the solution of source
She succeeds the late Robert E. Spinner. Prior to data automation problems. This is done primarily
her election to these offices, Mrs. Spinner had been through the manufacturing and marketing of a porta-
Treasurer of SDA as well as a member of the Board, ble data collection device called the Porta-Station®
and had served actively in the management and opera- Mrs. Spinner will also act as President of this sub-
tion of the corporation. sidiary.

COMPUTERS and AUTOMATION for January, 1973 45


)
CALE,NDAR :OF C'OMING EVENTS

Jan. 17-19, 1973: Hospital Information Systems Sharing Group, April 30-May 2, 1973: 1st Symposium on Computer Software Re-
Information Science and the Health Care Institution seminar, liability, Americana Hotel, New York, N.Y. / contact: David
Frontier Hotel, Las Vegas, Nev. / contact: Dean R. Cannon, Goldman, IEEE Hdqs., 345 E. 47th St., New York, NY 10017
P.O. Box 305, Bountiful, UT 84010 May 3-4, 1973: 10th Annual National Information Retrieval
Jan. 17-19, 1973: 1973 Winter Simulation Conference, San Fran- Colloquium, Independence Mall Holiday Inn, 400 Arch St.,
cisco, Calif. / contact: Robert D. Dickey, Bank of California, Philadelphia, Pa. / contact: Martin Nussbaum, Computamation,
400 California St., San Francisco, CA 94120 2955 Kensington Ave., Philadelphia, PA 19134

Jan. 31-Feb. 1, 1973: San Diego Biomedical Symposium, Sheraton- May 13-16, 1973: 1973 International Systems Meeting, Hilton
Harbor Island Hotel, San Diego, Calif. / contact: Dr. Robert H. Hotel, Denver, Colo. / contact: R. B. McCaffrey, Association
Riffenburgh, Program Chmn., San Diego Biomedical Symposium for Systems Management, 24587 Bagley Rd., Cleveland, OH
P.O. Box 965, San Diego, CA 92112 44138
May 14-17, 1973: Spring Joint Computer Conference, Convention
Feb. 20-22, 1973: Computer Science Conference, Neil House, Hall, Atlantic City, N.J. / contact: AFIPS Hdqs., 210 Summit
Columbus, Ohio / contact: Dr. Marshall Yovits, 101 Caldwell Ave., Montvale, NJ 07645
Lab., 2024 Neil Ave., Ohio State Univ., Columbus, OH 43210
June 4-6, 1973: 1973 8th PICA Conference, Radisson Hotel,
Mar. 4-9, 1973: SHARE Meeting, Denver, Colo. / contact: D.M. Minneapolis, Minn. / contact: IEEE Hdqs., Tech. Svcs., 345 E.
Smith, SHARE, Inc., Suite 750, 25 Broadway, New York, NY 47th St., New York, NY 10017
10004
June 4-8, 1973: National Computer Conference and Exposition,
Mar. 7-8, 1973: 1973 Annual Spring Conference of the Association Coliseum, New York, N.Y. / contact: AFIPS Hdqs., 210 Sum-
for Systems Management, Royal York Hotel, Toronto, Ontario / mit Ave., Montvale, NJ 07645
contact: Mr. R. H. Crawford, Comptroller's Department, June 22-23, 1973: 11th Annual Computer Personnel Conference,
Imperial Oil Limited, 825 Don Mills Rd., Don Mills, Ontario, Univ. of Maryland Conference Center, College Park, Md. / con-
Canada tact: Prof. A. W. Stalnaker, College of Industrial Management,
Mar. 9, 1973: 4th Annual AEDS Conference on the Development Georgia Institute of Technology, Atlanta, GA 30332
and Evaluation of Educational Programs in Computer Science June 26-28, 1973: Workshop of Computer Architecture, Univer-
and Data Processing, St. Louis, Mo. / contact: Ralph E. Lee, siti~ de Grenoble, Grenoble, France / contact: Grenoble Ac-
P.O. Box 951, Rolla, MO 65401 cueil, 9, Boulevard Jean-Pain, 38000, Grenoble, France
Mar. 7-9, 1973: 6th Annual Simulation Symposium, Tampa, Fla. / June 26-29, 1973: DPMA 1973 International Data Processing Con-
contact: Annual Simulation Symposium, P.O. Box 22573, ference & Business Exposition, Conrad Hilton Hotel, Chicago,
Tampa, FL 33622 III. / contact: Richard H. Torp, DPMA International Hdqs., 505
Busse Highway, Park Ridge, I L
Mar. 12-14, 1973: A Programming Language (APL), Goddard
Space Flight Center, Greenbelt, Md. / contact: Cyrus J. July 20-22, 1973: 1973 International Conference of Computers in
Creveling, Code 560, Goddard Space Flight Center, Greenbelt, the Humanities, University of Minnesota, Minneapolis, Minn. /
MD 20771 contact: Prof. Jay Leavitt, 114 Main Engineering Bldg., Univer-
sity of Minnesota, Minneapolis, MN 55455
Mar. 26-29, 1973: IEEE International Convention (lNTERCON),
Coliseum & New York Hilton Hotel, New York, N.Y. / contact: July 23-27, 1973: 3rd Annual International Computer Exposition
J. H. Schumacher, IEEE, 345 E. 47th St., New York, NY 10017 for Latin America, Maria Isabel-Sheraton Hotel, Mexico City,
Mexico / contact: Seymour A. Robbins and Associates, 273
Mar. 27-29, 1973: 1st Conference on Industrial Robot Technology,
Merrison St., Box 566, Teaneck, NJ 07666
University of Nottingham, England / contact: Organising Secre-
tary, CI RT, Dept. of Production Engineering and Production Aug. 13-17, 1973: SHARE Meeting, Miami Beach, Fla. / contact:
Management, University of Nottingham, Nottingham NG7 2RD, D. M. Smith, SHARE, Inc., Suite 750, 25 Broadway, New York,
England NY 10004
Mar. 29-31, 1973: 10th Symposium on Biomathematics and Com- Aug. 20-24, 1973: 3rd International Joint Conference on Artificial
puter Science in the Life Sciences, Houston, Texas / contact: Intelligence, Stanford University, Stanford, Calif. / contact: Dr.
Office of the Dean, The University of Texas Graduate School of Max B. Clowes, Laboratory of Experimental Psychology, Univer-
Biomedical Sciences at Houston, Division of Continuing Educa- sity of Sussex, Brighton, Sussex BNl 90Y, England
tion, P.O. Box 20367, Houston, TX 77025 Aug. 27-29, 1973: ACM '73, Atlanta, Ga. / contact: Dr. Irwin E.
Perlin, Georgia Institute of Technology, 225 North Ave., N.W.,
April 2-5, 1973: SOFTWARE ENGINEERING FOR TELECOM-
Atlanta, GA 30332
MUNICATION SWITCHING SYSTEMS, University of Essex,
Essex, England / contact: Mrs. Penelope Paterson, Institution Aug. 30-Sept. 1, 1973: International Conference on Systems and
of Electrical Engineers Press Office, Savoy Place, London WC2R Control, PSG College of Technology, Coimbatore, India / con-
OBL, England tact: Dr. R. Subbayyan, PSG College of Technology, Coimba-
tore 641004, Tamil Nadu, India
April 10-12, 1973: Datafair 73, Nottingham University, Notting-
h;!m. Fngland ! contact: John Fow!er & Partners Ltd., 6-8 Sept. 4-7, 1973: !ntcri1~t:onu! Computing Sympo:;:um 1973, Duvo:;,
Emeral St., London WCl N 30A, England Switzerland / contact: Dr. H. Lipps, I nternational Computing
Symposium 1973, c/o CERN, CH-1211 Geneva 23, Switzerland
April 10-13, 1973: PROLAMAT '73, Second International Confer-
ence on Programming Languages for Numerically Controlled Oct. 2-4, 1973: 2nd International Computer-Aided Design and
Machine Tools, Budapest, Hungary / contact: I FIP Prolamat, Computer-Aided Manufacturing Conf., Detroit Hilton Hotel,
'73, Budapest 112, P.O. Box 63, Hungary Detroit, Mich. / contact: Public Relations Dept., Society of
Manufacturing Engineers, 20501 Ford Rd., Dearborn, MI 48128
April 24-26, 1973: I.S.A. Joint Spring Conference, Stouffer's
Riverfront Inn, St. Louis, Mo. / contact: William P. Lynes, Oct. 8-12, 1973: BUSINESS EQUIPMENT SHOW, Coliseum, New
c/o Durkin Equipment, 2384 Centerline Ind. Dr., St. Louis, MO York, N.Y. / contact: Rudy Lang, Prestige Expositions, Inc.,
63122 60 East 42 St., New York, NY 10017

46 COMPUTERS and AUTOMATION for January, 1973


MONTHLY COMPUTER CENSUS
Neil Macdonald
Survey Editor
COMPUTERS AND AUTOMATION

The following is a summary made by COMPUTERS AND AUTOMATION of re- The following abbreviations apply:
ports and estimates of the number of general purpose electronic digit-
al computers manufactured and installed, or to be manufactured and on (A) -- authoritative figures, derived essentially from information
order. These figures are mailed to individual computer manufacturers sent by the manufacturer directly to COMPUTERS AND
from time to time for their information and review, and for any updat- AUTOMATION
ing or comments they may care to provide. Please note the variation C figure is combined in a total
in dates and reliability of the information. Several important manu- (D) acknowledgment is given to DP Focus, Marlboro, Mass., for
facturers refuse to give out, confirm, or comment on any figures. their help in estimating many of these figures
E figure estimated by COMPUTERS AND AUTOMATION
Our census seeks to include all digital computers manufactured any- (N) manufacturer refuses to give any figures on number of in-
where. We invite all manufacturers located anywhere to submit infor- stallations or of orders, and refuses to comment in any
mation for this census. We invite all our readers to submit informa- way on those numbers stated here
tion that would help make these figures as accurate and complete as (R) -- figures derived all or in part from information released
possible. indirectly by the manufacturer, or from reports by other
sources likely to be informed
Part I of the Monthly Computer Census contains reports for United (S) sale only, and sale (not rental) price is stated
States manufacturers. Part I I contains reports for manufacturers X no longer in production
outside of the United States. The two parts are published in alter- information not obtained at press time
nate months.
SUMMARY AS OF DECEMBER 15, 1972

DATE OF AVERAGE OR RANGE NUMBER OF INSTALLATIONS NUMBER OF


NAME OF NAME OF FIRST OF MJNTHLY RENTAL In Outside In UNFILLED
MANUFACTURER COMPUTER INSTALLATION $(000) U.S.A. U.S.A. World ORDERS
Part 1. United States Manufacturers
Adage, Inc. AGT 10 Series 4/68 X 32 3 35 X
Brighton, Mass. AGT 100 Series 1/72 100-300 (S) 8 3 11 3
(A) (11/72)
Autonetics RECOMP II 11/58 X 30 0 30 X
Anaheim, Calif. RECOMP III 6/61 X 6 0 6 X
(R) (1/69)
Bailey Meter Co. Metrotype 10/57 40-200 (S) 8 0 8 0
Wickliffe, Ohio Bailey 750 6/60 40-250 (S) 37 15 52 0
(A) (6/72) Bailey 755 11/61 200-600 (S) 7 0 7 0
Bailey 756 2/65 60-400 (S) 15 12 27 2
Bailey 855/15 12/72 50-400 (s) 0 0 0 2
Bailey 855/25 4/68 100-1000 (S) 16 0 16 0
Bailey 855/50 3/72 100-1000 (S) 0 0 0 12
Bunker-Ramo Corp. BR-130 10/61 X 160 X
Westlake Village, Calif. BR-133 5/64 X 79 X
(A) (12/72) BR-230 8/63 X 15 X
BR-300 3/59 X 18 X
BR-330 12/60 X 19 X
BR-340 12/63 X 19 X
BR-1018 6/71 23.0 (S)
BR-1018C 9/72
Burroughs 205 1/54 X 25-38 27-40 X
Detroit, Mich. 220 10/58 X 28-31 30-33 X
(N) (12/72) BlOO/B500 7/65 2.8-9.0
B2500 2/67 4.0 52-57 12 64-49 117
B3500 5/67 14.0 45 18 62 190
B5500 3/63 23.5 65-74 7 72-81 8
B5700 1
B6500 2/68 33.0 4 4 60
B6700 1
B7500 4/69 44.0 13
B8500 8/67 200.0 1 1 5
Computer Automation, Inc. 108/208/808 6/68 5.0 (S) 165 10 175 110
Newport, Calif. 116/216/816 3/69 8.0 (S) 215 20 235 225
(A) (4/71)
Consultronics, Inc. DCT-132 5/69 0.7 35 65 100
Garland, Texas
(A) (12/72)
Control Data Corp. GIS 7/55 X 295 X
Minneapolis, Minn. G20 4/61 X 20 X
(R) (7/71) LGP-2l 12/62 X 165 X
LGP-30 9/56 X 322 X
RPC4000 1/61 X 75 X
636/136/046 Series 29
160/8090 Series 5/60 X 610 X
92l/924-A 8/61 X 29 X
1604/ A/B 1/60 X 59 X
l700/SC 5/66 3.8 425-475 0
3100/3150 5/64 10-16 83-110 C
3200 5/64 13.0 55-60 C
3300 9/65 20-38 205 C
3400 11/64 18.0 15 C
3500 8/68 25.0 15 C
3600 6/63 52.0 40 C
3800 2/66 53.0 20 C
6200/6400/6500 8/64 58.0 108 C
6600 8/64 115.0 85 C
6700 6/67 130.9 5 C
7600 12/68 235.0 8 C
Total:
160 E
Data General Corp. Nova 2/69 9.2 (S) 920
Southboro, Mass. Supernova 5/70 9.6 (S) 200
(A) (11/72) Nova 1200 12/71 5.4 (S) 2100
Nova 800 3/71 6.9 (S) 310

COMPUTERS and AUTOMATION for January. 1973 47

1
DATE OF AVERAGE OR RANGE NilllEER OF INSTALLATIONS NilllEER OF
NMlli OF NAHE OF FIRST OF HONTHLY RENTAL In Outside In UNFILLED
HANUFACTURER CO~1PUTER INSTALLATION $ (000) U.S.A. U.S.A. World ORDERS
Data General (cont'd) Nova 1210/1220 2/72 4.2 ;5. 2 (S) 535
Nova 820 4/72 6.4 (S) 85
Datacraft Corp. 6024/1 5/69 52-300 (S) 17 0 17 2
Ft. Lauderdale, Fla. 6024/3 2/70 33-200 (S) 108 13 121 55
(A) (11/72) 6024/5 12/71 11-80 (S) 28 0 28 65
Digiac Corp. Digiac 3060 1/70 9.0 (S) 78 78 8
Plainview, N. Y • Digiac 3080 12/64 X 16 16 X
(A) (5/72) Digiac 3080C 10/67 X 8 8 X
Digi tal Computer Controls, Inc. D-112 8/70 10.0 (S) 634 100 734
Fairfield, N.J. D-116 1/72 10.0 (S) 488 30 518
(A) (11/72)
Digital Equipment Corp. PDP-l 11/60 X 48 2 50 X
Haynard, Nass. PDP-4 8/62 X 40 5 45 X
(A) (5/72) PDP-5 9/63 X 90 10 100 X
PDP-6 10/64 X 23 X
PDP-7 11/64 X 100 X
PDP-8 4/65 X 1402 X
PDP-8/1 3/68 X 3127 X
PDP-8/S 9/66 X 918 X
PDP-8/L 11/68 X 3699 X
PDP-8/E 4.9 (S) 3787
PDP-8/N 3.9 (S) 365
PDP-8/F 5/72 3.9 (S) 2
PDP-9 12/66 X 436 X
PDP-9L 11/68 X 40 X
DECSystem-10 12/67 700-3000 (S) 243
PDP-11/20 10.8 (S) 2740
PDP-11R20 13.8 (S) 14
PDP-11/05 10.8 (S) 0 0 0
PDP-11/45 0 0 0
PDP-12 9/69 620
PDP-IS 2/61 17.0 (S) 545
LINC-8 9/66 X 200 X
Total:
18456
Electronic Associates Inc. 640 4/67 1.2 109 61 170 1
West Long Branch, N.J. 8400 7/67 12.0 21 8 29 0
(A) (11/72) PACER 100 7/72 1.0 12 18 30 18
EHR Computer EHR 6020 4/65 5.4 15 1 16 0
Hinneapolis, Ninn. EHR 6040 7/65 6.6 6 0 6 0
(A) (11/72) EHR 6050 2/66 9.0 15 2 17 0
ENR 6070 10/66 15.0 7 8 15 0
EHR 6130 8/67 5.0 34 13 47 0
E}1R 6135 2.6 36 5 41 4
E}1R 6145 7.2 8
E}1R 6140 0
General Automation, Inc. SPC-12 1/68 1400
Anaheim, Calif. SPC-16 5/70 800
(A) (8/72) System 18/30 7/69 200
General Electric GE-PAC 3010 5/70 2.0 25 1 26 35
West Lynn, Hass. GE-PAC 4010 10/70 6.0 30 4 34 32
(Process Control Computers) GE-PAC 4020 2/67 6.0 200 60 260 32
(A) (10/72) GE-PAC 4040 8/64 X 45 20 65 X
GE-PAC 4050 12/66 7.0 23 2 25 1
GE-PAC 4060 6/65 X 18 20
Hewlett Packard 2114A, 2114B 10/68 0.25 1182
Cupertino, Calif. 2115A 11/67 0.41 333
(A) (7/72) 2116A, 2116B, 2116C 11/66 0.6 1171
2100A 3/71 0.5 2080
Honeywell Information Systems G58 5/70 1.0
Wellesley Hills, Hass. G105A 6/69 1.3
(R) (6/72) G105B 6/69 1.4
G105RTS 7/69 1.2
G115 4/66 2.2 200-400 420-680 620-1080
Gl20 3/69 2.9
G130 12/68 4.5
G205 6/64 X 11 0 11 X
G210 7/60 X 35 0 35 X
G215 9/63 X 15 1 16 X
G225 4/61 X 145 15 160 X
G235 4/64 X 40-60 17 57-77 X
G245 11/68 X 3 3 X
G255 T/S 10/67 X 15-20 15-20 X
G265 T/S 10/65 X 45-60 15-30 60-90 X
G275 T/S 11/68 X 10 X
G405 2/68 6.8 10-40 15-45
G410 T/S 11/69 1.0
G415 5/64 7.3 70-100 240-400 240-400
G420 T/S 6/67 23.0
G425 6/64 9.6 50-100 20-30 70-130
G430 T/S 6/69 17.0
G435 9/65 14.0 20 26
G440 T/S 7/69 25.0
G615 3/68 32.0
G625 4/65 X 23 3 26 X
G635 5/65 47.0 20-40 3 23-43
1I-110 8/68 2.7 180 7 255 0
H-115 6/70 3.5 30 30
H-120 1/66 4.8 800 160 960
H-125 12/67 7.0 150 220 370
H-200 3/64 7.5 800 275 1075
H-400 12/61 10.5 46 40 86 X
H-800 12/60 30.0 58 15 73 X
H-1200 2/66 9.8 230 90 320
H-1250 7/68 12.0 130 55 185

48 COMPUTERS and AUTOMATION for January, 1973


\-.
DATE OF AVERAGE OR RANGE NUHBER OF INSTALLATIONS NlJ}1BER OF
NANE OF NANE OF FIRST OF HONTHLY RENTAL In Outside In UNFILLED
NANUFACTURER COHPUTER INSTALLATION $(000) U.S.A. U.S.A. Hor1d ORDERS
Honeywell (cont'd) H-1400 1/64 14.0 4 6 10 X
H-1800 1/64 50.0 15 5 20 X
H-2200 1/66 18.0 125 60 185
H-3200 2/70 24.0 20 2 22
H-4200 8/68 32.5 18 2 20
H-8200 12/68 50.0 10 3 13
DDP-24 5/63 2.65 90 X
DDP-116 4/65 X 250 X
DDP-124 3/66 X 250 X
DDP-224 3/65 X 60 X
DDP-316 6/69 0.6 450
DDP-416 X 350 X
DDP-516 9/66 1.2 900
H112 10/69 75
H632 12/68 3.2 12
H1602
H1642
H1644
H1646
H1648 11/68 12.0 20
H1648A
IBN • 305 12/57 3.6 40 15 55
Hhite Plains, N.Y. 650 10/67 4.8 50 18 68
(N) (D) (12/72) 1130 2/66 1.5 2580 1227 3807
1401 9/60 5.4 2210 1836 4046
1401-G 5/64 2.3 420 450 870
1401-H 6/67 1.3 180 140 320
1410 11/61 17.0 156 116 272
1440 4/63 4.1 1690 1174 2864
1460 10/63 10.0 194 63 257
1620 I, II 9/60 4.1 285 186 471
1800 1/66 5.1 415 148 563
7010 10/63 26.0 67 17 84
7030 5/61 160.0 4 1 5
704 12/55 32.0 12 1 13
7040 6/63 25.0 35 27 2
7044 6/63 36.5 28 13 41
705 11/55 38.0 18 3 21
7020, 3/60 27.0 10 3 13
7074 3/60 35.0 44 26 70
7080 8/61 60.0 13 2 15
7090 11/59 63.5 4 2 6
7094-1 9/62 75.0 10 4 14
7094-II 4/64 83.0 6 4 10
System/3 Hodel 6 3/71 1.0 2
Sys tem/ 3 Hodel 10 1/70 1.1
System/7 11/71 0.35 and up
360/20 12/65 2.7 7161 6075 13236 1780
360/25 1/68 5.1 1112 759 1871 1287
360/30 5/65 10.3 5487 2535 8022
360/40 4/65 19.3 2454 1524 3977 1363
360/44 7/66 11.8 109 57 166 39
360/50 8/65 29.1 1135 445 1580 662
360/65 11/65 57.2 601 144 745 562
360/67 10/65 133.8 57 6 63 99
360/75 2/66 66.9 50 17 67 12
360/85 12/69 150.3 11 1 12 55
360/90 11/67 5 5
360/190 13 15
360/195 4/71 232.0 9 48
370/135 5/72 14.4 3
370/145 9/71 23.3 1
370/155 2/71 48.0
370/158 -/73 49.5-85.0
370/165 5/71 98.7
370/168 -/73 93.0-170.0
370/195 6/73 190.0-270.0
Interdata Nadell 12/70 3.7 205 75 280 85
Oceanport, N.J. Nadel 3 5/67 200 X
(A) (11/72) Hodel 4 8/68 8.5 270 115 385 40
Hodel 5 11/70 X 70 20 90 X
Hodel 15 1/69 20.0 40 24 64 X
Hodel 16 5/71 X 1 5 6 X
Hodel 18 6/71 X 2 6 8 X
Hodel 50 5/72 6.8 7 3 10 21
Hodel 70 10/71 6.8 207 49 256 141
Hodel 80 10/72 14.9 4 0 4 21
Hicrodata Corp. Hicro 400 12/70 0.1-0.5 160 0 125
Santa Ana, Calif. Hicro 800 12/68 0.2-3.0 1916 700 2616
(A) {11/72) Hicro 1600 12/71 0.2-3.0 263 80 343
NCR 304 1/60 X 5 2 7 X
Dayton, Ohio 310 5/61 X 8 0 8 X
(A) (12/72) 315 5/62 7.0 255 200 455
315 RHC 9/65 9.0 55 35 90
390 5/61 0.7 160 325 485
500 10/65 1.0 llOO 1750 3650
Century 50 2/71 1.6 580 0 600
Century 100 9/68 2.6 1175 780 1955
Century 101 12/72 3.7 50 50
Century 200 6/69 7.0 575 330 905
Century 300 2/72 21.0 5 5 10
Phil co 1000 6/63 X 16 X
Willow Grove, Pa. 200-210,211 10/58 X 16 X
(N) (1/69) 2000-212 1/63 X 12 X

COMPUTERS and AUTOMATION for January, 1973 49


DATE OF AVERAGE OR RANGE NUMBER OF INSTALLATIONS NUMBER OF
NAME OF NAME OF FIRST OF MONTHLY RENTAL In Outside In UNFILLED
MANUFACTURER COMPUTER INSTALLATION $(000) U.S.A. U.S.A. World ORDERS
Raytheon Data Systems Co. 250 12/60 X 115 20 135 X
Norwood, Mass. 440 3/64 X 20 X
(A) (10/72) 520 10/65 X 26 1 27 X
703 10/67 12.5 (5) 175 33 208 4
704 3/70 7.2 (5) 260 70 330 30
706 5/69 19.0 (5) 75 15 90 2
Standard Computer Corp. IC 4000 12/68 9.0 9 0 9 2
Los Angeles, Calif. IC 6000-6000/E 5/67 16.0 3 0 3
(A) (6/72) IC 7000 8/70 17.0 4 0 4
IC-9000 5/71 400.0 (5) 1 0 1
Systems Engineering Laboratories SYSTEMS 810B 9/68 2.6 168 10 178
Ft. Lauderdale, Fla. SYSTEMS 71 8/72 0.9
(A) (12/72) SYSTEMS 72 9/71 1.0 14 3 17
SYSTEMS 85 7/72 6.0 3 1 4
SYSTEMS 86 6/70 10.0 31 1 32
UNIVAC Div. of Sperry Rand I & II 3/51 & ll/57 X 23 X
New York, N.Y. III 8/62 X 25 31 X
(A) (4/72) File Computers 8/56 X 13 X
Solid-State 80 I, II,
90, I, II, & Step 8/58 X 210 X
418 6/63 11.0 80 39 119 23 E
490 Series 12/61 30.0 76 14 90 15
1004 2/63 1.9 1522 610 2132
1005 4/66 2.4 617 248 865 72
1050 9/63 8.5 l36 59 195
1100 Series (except
ll07, 1108) 12/50 X 9 0 9 X
1107 10/62 X 8 3 11 X
1108 9/65 68.0 103 129 232 58 E
9200 6/67 1.5 1106 835 1941 725
9300 9/67 3.4 412 62 474 510 E
9400 5/69 7.0 82 41 123 83 E
LARC 5/60 135.0 2 0 2
UNIVAC - Series 70 301 2/61 7.0 144
Blue Bell, Pa. 501 6/59 14.0-18.0 16
(A) (11/72) 601 11/62 14.0-35.0 3
3301 7/64 17.0-35.0 71
Spectra 70/15, 25 9/65 4.3 17
Spectra 70/35 1/67 9.2 102
Spectra 70/45 11/65 22.5 303
Spectra 70/46 33.5 34
Spectra 70/55 11/66 34.0 15
Spectra 70/60 11/70 32.0 12
Spectra 70/61 4/70 42.0 7
70/2 5/71 16.0 58
70/3 9/71 25.0 4
70/6 9/71 25.0 l3
70/7 12/71 35.0 7
Varian Data Machines 620 11/65 X 75 X
Newport Beach, Calif. 620i 6/67 X 1300 X
(A) (8/72) R-620i 4/69 80
520/DC, 520i 12/69;10/68 350
620/f 11/70 201 3
620/L 4/71 474 114
620/f-l00 6/72 13 16
620/L-100 5/72 21 19
Varian 73 12
Xerox Data Systems XDS-92 4/65 1.5 43 4 47
E1 Segundo, Calif. XDS-910 8/62 2.0 170 10 180
(N) (R) (12/72) XDS-920 9/62 2.9 120 12 132
XDS-925 12/64 3.0 15 1 16
XDS-930 6/64 3.4 159 14 173
XDS-940 4/66 14.0 32 3 35
XDS-9300 11/64 8.5 25-30 4 25-34
Sigma 2 12/66 1.8 163 36 199
Sigma 3 12/69 2.0 13 0 10
Sigma 5 8/67 6.0 29 14 43
Sigma 6 6/70 12.0
Sigma 7 12/66 12.0 30 37
Sigma 8 2/72 3
Sigma 9 35.0

USE ECONOMICAL C&A CLASSI FI ED ADS to buy or sell ADVERTISING INDEX


your computer and data processing equipment, to offer serv-
ices to the industry, to offer new business opportunities, to Following is the index of advertisements. Each item con-
seek new positions or to fill job vacancies, etc. tains: name and address of the advertiser / name of the agen-
cy, if any / page number where the advertisement appears.
Rates for Classifed Ads: THE C&A NOTEBOOK ON COMMON SENSE, ELEMEN-
90i per word - minimum, 20 words TARY AND ADVANCED, published by Computers and
Automation, 815 Washington St., Newtonville, Mass.
First line all capitals - no extra charge
02160/ Pages 2, 3
(Ads must be prepaid)
COMPUTERS AND AUTOMATION, 815 Washington St.,
Send Copy to: Newtonville, Mass. 02160/ Page 51
COMPUTERS AND AUTOMATION WHO'S WHO IN COMPUTERS AND DATA PROCESSING,
815 Washington Street jointly published by Quadrangle Books (a New York
Newtonville, MA 02160 Times Company) and Berkeley Enterprises, Inc., 815
Telephone (617) 332-5453 Washington St., Newtonville, Mass. 02160/ Page 52
I
50 COMPUTERS and AUTOMATION for January. 1973 .~
WILL YOU HELP?
Please give us their names and addresses on the
form below or add another sheet of paper. Trim out the
card with scissors and drop it in the mail. We'll gladly
pay the postage to learn of possible new friends. And many
Yes, you. It may come as a surprise that you'd be asked thanks for your help! As a token of our appreciation we'll
. . . but as a reader of Computers & Automation you are send you our ****Reprint .
in a unique position to help us.
P.S. If you like you may mail your list separately to:
NAMES ... people, institutions, companies who R. A. Sykes, Circulation Mgr.
should be interested in 1) the computer industry and/or Computers & Automation
2) seeking truth in information are very much needed to 815 Washington Street
join you as readers of C&A. Newtonville, MA 02160
Will you tell us who they are? And perhaps even more, will cut here and tuck in flap
you let us use your name in writing to them? But with or r--------------------------,
/ TO: R. A. Sykes, Circulation Mgr. \
without your name (we'll only use it if you grant permission) / .
/ Computers & AutomatIOn \
we need to know those you think might be interested in also / I
reading C&A. / I suggest you send information on C&A to ... (attach \
i /
/
/ list if you like) \
I
I

I * *' * *'
COIT1~!ila~!!£!'
reprint from
f!/
/
/
/
/ (1) Name

Address
\
I
I
I
Ig
cuI City _ _ _ _ _ _ _ _ State _ _ _ _ ZIP _ _ __ Ir+
.l:/ I~
Science and the Advanced Society, by C. P. Snow, Minis try B,' la
(2) Name _____________________________ \
of Technology, London, England (April 1966) / \
\
/
The Information Revolution and the Bill of Rights, by I Address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ \
/ \
Dr. Jerome B. Wiesner, M.I.T. (May 1971) / \
Employment, Education, and the Industrial System, by / City _ _ _ _ _ _ _ _ State _ _ _ _ ZI P _____ \
/ I
Prof. John Kenneth Galbraith, Harvard Univ. (Aug. 1965)
Computers and the Consumer, by Ralph Nader, /
/
May we use your name? DYES o NO
I
\
IPlease give us your name and address on the form below so we can \
Washington, D.C. (Oct. 1970) " send you your * * * * Reprint. Just cross out the subscription request
\
I
/ - unless you also want to enter your new or renewal order. I
cut here _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Fold here - do not cut

.~
YES, start my subscription to COMPU-
M en ::E TERS AND AUTOMATION according to the
~ en
<t
.~
instructions checked below.
M
~ ~ · f6
<t
...J 0 2'
·~
.~
al
One Year (including the Computer Directory and
Guide - 13 issues) U.S. only. 0 $18.50
Buyers'

U 2
l- e .~

• c:
en
a: !:: l-
en :.! One Year (excluding the Computer Directory and Buyers'
~ e Guide - 12 issues) U.S. only. 0 $9.50
u. a: OJ
w U
Z
a.. Name: _ _ _ _ _ _ _ __ Title:
V)
w Organization: _ _ _ _ _ _ _ _ _ _ _ __
C/)

a: Address: _ _ _ _ _ _ _ _ _ __
a.. City: _ _ _ _ _ _ __ State: _ _ _ _ _ Zip:
Vl a:
~ W Z
<t
<1l
ci5
f-
z a Country if not U.S.: _ _ _-'--_ OJ

w Signature: P.O. No.: ~


~
/. ....0 "'0
~ >- « III

r
,I
Q)
~
·c w
..J ~
o Payment enclosed o Renewal
::I
Cl ~
" I CII
Gi
Cl ::J
(l)
w
~
a o Bill me o New subscription 0 ~
cu
....::I
oS: 0 ..c a: ~ 0
Q)
.... w :J .... (0 To SPEED the processing of your order, please check the one best a.
~
Q) CJ

«
I <1l
a. c descriptor in each of the two categories below. (ThIS IOforma[1on

l
CD Q) ti
III Q)
N will be used for statistical purposes only.)
ti "'0 >- 0
I
~
.n; CD 0 ....
~

en
BUSINESS TYPE JOB FUNCTION
I
<t
0 Z aI-Computer Manufacturer l-Technical Management; (computer
I OJ
...J
~
~
-
E

~
~
a..
w
«
en
c
....e
Cl
«
~
02-Aerospace / Aircraft
Manufacturer
03-0ther Manufacturing
installation management, program
management, or engineering mgmU
2-Computer Center Personnel;
(methods & procedure analysts,
~
CD ex:: c Q) 04-Raw Materials Processing; and operators)
W (chemical, primary metal,
~ (l)
u
..J ..c: petroleum, food, etc.) 3-Programming Personnel; (systems,
...J (l)
..J ~ <I)
> application & research programmers)
a.. c :J C"C
c OS-Mining and Construction
w ~ 4-Professional: (systems analysts,
a: 0.
w
a. ~ ....e 06-Computing & Consulting mathematicians, operations
E 07-Finance, Insurance, Pub!', researchers, and professors)
<:J ~ ~ and Service Organizations
en
en ~ <t 0
Ln
r- Q)
OB-Transportation Companies
5-General Management Executives;
(corporate officers, owners, and
W l- t.) CX) Z
2b C/) 09-Public Utilities partners)
2 0
Cii ~ a.. la-Research 6-E~gineering Personnel; (systems .
engineers, research a. development enilneers)
::J 00. II-Wholesale, Retail, Sales,
OJ and Marketing Firms 7-Research Personnel
0 12-Educational; (College, 8-Students
2 University, or School) 9-Library Subscription
13-Government and Military 10-Subscription in Company Harne
14-Libraries Only
; .'

~~WHO'S WHO IN COMPUTERS \ 'I

AND DATA PROCESSING" I

EDITION 5.2 = 5th EDITION + 2 SUPPLEMENTS

THE MOST ESSENTIAL COMPOl\JENTS IN COMPUTERS AND DATA PROCESSING ARE PEOPLE

Who are they? ANDREE, Richard V. / professor, author, lecturer,


consultant / b: 1919 / ed: BS, Univ of Chicago,
What do they do ? PhD, Univ of Wisconsin / ent: 1948 / m-i: A Ma
P Sy; writing, information science / t: professor o~
Where do they do it ? math, research associate in computing science I.
org: Univ of Oklahoma, Norman, OK 73069 / pb~
h: ACM, AEDS, ASL, DPMA, MAA, NCTM,
SIAM lecturer, American Assn for the Advance-
Consult ment of Science, American Math Society, Ameri-'
"WHO'S WHO I N COMPUTE RS can Society for Engineering Education, Mu Alpha
Theta, Pi Mu Epsilon, Sigma Xi, 3 fellowships,
AND DATA PROCESSI NG"
numerous committees, Who's Who in America,
jointly published by Quadrangle Books (a New York Times World Who's Who, editor, 12 books, 8 paperbacks,
company) and Computers and Automation (Berkeley about 20 articles / h: 627 E Boyd, Norman, OK
Enterprises, Inc.) 73069

We are confident that you will find the subscription


"Who's Who in Computers and Data Processing" has will repay you many times over. In fact, one day when.
been changed to an annual subscription basis as follows: this wealth of material gives you the inside track with .
1. The latest Cumulative Edition (the 5th edition someone important to you, you'll find the information
published 1971, containing over 15,000 cap- PRICELESS: the most essential component in EDP is
sule biographies, over 1,000 pages long, 3 GOOD PEOPLE.
volumes, hardbound) PLUS RETURNABLE IN 10 DAYS
FOR FULL REFUND
2. At least 3 Updating Supplements per year ex- (if not satisfactory)
pected to total over 3,000 entries
Both for $34.50 per year in any year when a cumula- r- - - - - - - (may be copied on any piece of paper)- - - - - - - - -

tive edition is supplied ... and $15.00 per year in any WHO'S WHO IN COMPUTERS AND DATA PROCESSING
year when a cumulative edition is not supplied. 815 Washington St., Newtonville, Mass. 02160

BASED ON "Computers and Automation" 's continual data YES, please enroll me as a subscriber to WHO'S WHO
gathering from computer professionals IN COMPUTERS AND DATA PROCESSING at
the following rate:
$34.50 including the last cumulative edition
This reference is particularly useful for: OR
$15.00 since I already have access to the last cum-
Personnel managers
ulative edition
Libraries
Conference planners I understand that in each 12 months I shall receive at
Directors of computer installations least three updating supplements, expected to total over
Suppliers to the computer industry 3000 entries.
Executive search organizations
Payment enclosed ) Please bill me.
Prospective authors
( ) Please bill my organization
Prospective speakers ...
RETURNABLE IN 10 DAYS
anyone who needs to keep up with the important people FOR FULL REFUND
in the field. (if not satisfactory)

Each computer professional has a capsule biography Name


detailing: last name; first name and middle initial (if
any); occupation; year of birth; university education Title
and degrees; year entered the computer field; main Organization
interests; job title; organization and its address; pub-
lications, honors and memberships; home address. See Address
sample in next column: City State & Zip

Your Signature P.O. No. (if company order)

Potrebbero piacerti anche